Published:2024/04/16  Last Updated:2024/04/16

JVN#23835228
Proscend Communications M330-W and M330-W5 vulnerable to OS command injection

Overview

M330-W and M330-W5 provided by Proscend Communications Inc. contain an OS command injection vulnerability.

Products Affected

  • M330-W versions prior to V1.11
  • M330-W5 versions prior to V1.11

Description

M330-W and M330-W5 provided by Proscend Communications Inc. are LTE Industrial Cellular Routers. M330-W and M330-W5 contain an OS command injection vulnerability (CWE-78).

Impact

An arbitrary OS command may be executed by an attacker who has access to the product.

Solution

Update the firmware
The developer provides firmware which contains a fix for this vulnerability. Download and update the firmware.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score: 8.8
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Credit

CYNEX Analysis Team of National Institute of Information and Communications Technology reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2022-36779
JVN iPedia JVNDB-2022-017175