CVE-2020-10210

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to gain root access to affected Amino Communications set-top boxes via SSH using hard-coded cryptographic keys. All devices in the listed series with default configurations are vulnerable. This affects customers using these devices, particularly in ISP deployments.

💻 Affected Systems

Products:
  • Amino Communications AK45x series
  • AK5xx series
  • AK65x series
  • Aria6xx series
  • Aria7/AK7Xx series
  • Kami7B
Versions: All versions with default configurations
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration due to hard-coded SSH keys that cannot be changed by users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the device with root privileges, allowing installation of persistent malware, data exfiltration, or use as a pivot point into internal networks.

🟠

Likely Case

Remote attackers gaining root shell access to vulnerable devices, potentially modifying configurations, stealing data, or using devices for botnet activities.

🟢

If Mitigated

Limited impact if SSH access is blocked at network boundaries or devices are not internet-facing.

🌐 Internet-Facing: HIGH - Devices exposed to the internet can be directly exploited without authentication.
🏢 Internal Only: HIGH - Even internally, any attacker with network access can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is trivial - attackers only need to use the publicly known hard-coded SSH keys to authenticate.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not publicly available

Restart Required: No

Instructions:

No official patch available. Contact Amino Communications for firmware updates or replacement options.

🔧 Temporary Workarounds

Block SSH Access

linux

Prevent SSH connections to affected devices using network controls

iptables -A INPUT -p tcp --dport 22 -j DROP
ufw deny 22

Network Segmentation

all

Isolate affected devices in separate VLANs with strict access controls

🧯 If You Can't Patch

  • Replace affected devices with models that don't have hard-coded credentials
  • Implement strict network segmentation and firewall rules to block all SSH access to these devices

🔍 How to Verify

Check if Vulnerable:

Attempt SSH connection to port 22 of device using known hard-coded keys. If connection succeeds, device is vulnerable.

Check Version:

ssh -i known_hardcoded_key root@device_ip 'cat /etc/version'

Verify Fix Applied:

Verify SSH connections are blocked or fail authentication. Check that known hard-coded keys no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Failed SSH authentication attempts
  • Successful SSH logins from unexpected sources
  • Root user SSH sessions

Network Indicators:

  • SSH connections to port 22 from external IPs
  • Multiple SSH attempts to same device

SIEM Query:

source="ssh.log" (event="Accepted publickey" OR event="Failed publickey") AND user="root"

🔗 References

📤 Share & Export