CVE-2021-37123

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication in Hero-CT060 devices and perform unauthorized operations. It affects all Hero-CT060 devices running versions before 1.0.0.200. The vulnerability stems from insufficient identity validation when users attempt certain operations.

💻 Affected Systems

Products:
  • Hero-CT060
Versions: All versions before 1.0.0.200
Operating Systems: Embedded system (specific to Hero-CT060)
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to perform any operation normally restricted to authenticated users, potentially leading to data theft, system manipulation, or service disruption.

🟠

Likely Case

Unauthorized access to administrative functions, configuration changes, or sensitive data access that should require authentication.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH - Internet-facing devices are directly exposed to exploitation attempts without authentication requirements.
🏢 Internal Only: MEDIUM - Internal devices still vulnerable but require network access; risk depends on internal security controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated exploitation with low complexity due to improper authentication validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.0.200 or later

Vendor Advisory: https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210929-01-auth-en

Restart Required: Yes

Instructions:

1. Download firmware version 1.0.0.200 or later from Huawei support portal. 2. Backup current configuration. 3. Upload and apply the new firmware. 4. Reboot the device. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network segmentation

all

Isolate Hero-CT060 devices from untrusted networks and restrict access to authorized IP addresses only.

Access control lists

all

Implement strict firewall rules to limit which systems can communicate with Hero-CT060 devices.

🧯 If You Can't Patch

  • Segment the device on a dedicated VLAN with strict access controls
  • Monitor all traffic to/from the device for suspicious authentication bypass attempts

🔍 How to Verify

Check if Vulnerable:

Check the device firmware version via web interface or CLI. If version is below 1.0.0.200, the device is vulnerable.

Check Version:

Check via device web interface or use manufacturer-specific CLI commands for version verification.

Verify Fix Applied:

After patching, verify the firmware version shows 1.0.0.200 or higher and test that authentication is properly required for all operations.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful operations
  • Authentication bypass patterns in access logs
  • Unauthorized configuration changes

Network Indicators:

  • Unusual traffic patterns to administrative interfaces
  • Requests to sensitive endpoints without authentication headers

SIEM Query:

source="hero-ct060" AND (event_type="auth_bypass" OR (auth_result="success" AND auth_method="none"))

🔗 References

📤 Share & Export