CVE-2021-37555

9.8 CRITICAL

📋 TL;DR

CVE-2021-37555 allows attackers to gain root shell access on TX9 Automatic Food Dispenser devices via telnet using default credentials. This enables complete device compromise and filesystem access. Organizations using these food dispensers in commercial or institutional settings are affected.

💻 Affected Systems

Products:
  • TX9 Automatic Food Dispenser
Versions: v3.2.57
Operating Systems: Embedded Linux with BusyBox
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with telnet enabled and default root password unchanged are vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing firmware modification, data theft, or using device as pivot point into internal networks

🟠

Likely Case

Unauthorized access to device configuration, potential data exfiltration, and disruption of food dispensing operations

🟢

If Mitigated

Limited to isolated network segments with no sensitive data access

🌐 Internet-Facing: HIGH - Devices exposed to internet can be directly compromised
🏢 Internal Only: MEDIUM - Requires network access but default credentials make exploitation easy

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires telnet access and uses known default credentials

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Contact vendor for updated firmware or mitigation guidance.

🔧 Temporary Workarounds

Disable Telnet Service

linux

Disable telnet service to prevent remote access via default credentials

killall telnetd
remove telnet from startup scripts

Change Root Password

linux

Change default root password to strong unique password

passwd root

🧯 If You Can't Patch

  • Network segmentation: Isolate TX9 devices on separate VLAN with strict firewall rules
  • Disable telnet service and use SSH with key-based authentication if remote access needed

🔍 How to Verify

Check if Vulnerable:

Attempt telnet connection to port 23 and test root login with password 059AnkJ

Check Version:

Check device firmware version in web interface or via serial console

Verify Fix Applied:

Verify telnet service is disabled and root password has been changed

📡 Detection & Monitoring

Log Indicators:

  • Failed/successful telnet authentication attempts
  • Root login via telnet

Network Indicators:

  • Telnet connections to port 23
  • Unusual outbound connections from device

SIEM Query:

source_port=23 AND (event_type="authentication" OR event_type="login")

🔗 References

📤 Share & Export