Published:2023/03/17  Last Updated:2023/03/17

JVN#62420378
TP-Link T2600G-28SQ uses vulnerable SSH host keys

Overview

T2600G-28SQ provided by TP-Link uses vulnerable SSH host keys.

Products Affected

  • T2600G-28SQ firmware versions prior to "T2600G-28SQ(UN)_V1_1.0.6 Build 20230227"

Description

TP-Link layer-2 switch T2600G-28SQ uses vulnerable SSH host keys (CWE-1391).

Impact

The credential information for an affected device may be obtained when the administrator is tricked to login to a device which spoofs the affected device.

Solution

Update the Firmware
Update the firmware to the latest version according to the information provided by the developer.

Vendor Status

Vendor Link
TP-Link Corporation Limited Download for T2600G-28SQ | TP-Link

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score: 5.3
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:A/AC:H/Au:N/C:C/I:N/A:N
Base Score: 4.6
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Comment

Confidentiality Impact is evaluated as High (H) / Complete (C) as the administrator's credential information is breached.

Credit

Kuniyuki Hasegawa of VeriServe Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2023-28368
JVN iPedia JVNDB-2023-000025