CVE-2022-25217

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers on the local network to gain root access to affected devices via telnet by exploiting hard-coded cryptographic keys. It affects specific firmware versions of K2 and K3C devices, potentially including other unlisted models. Attackers can achieve complete device control through a scripted UDP packet exchange.

💻 Affected Systems

Products:
  • K2 firmware
  • K3C firmware
Versions: K2 firmware version 22.5.9.163, K3C firmware version 32.1.15.93, potentially other unlisted versions
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Other models and versions may be vulnerable but unconfirmed due to limited firmware availability for testing. Later versions removed private keys but kept unchanged public keys.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of affected devices, allowing attackers to install persistent malware, intercept network traffic, pivot to other systems, or use devices as botnet nodes.

🟠

Likely Case

Local network attackers gain root shell access to vulnerable devices, enabling configuration changes, credential theft, and lateral movement within the network.

🟢

If Mitigated

Devices remain secure if properly segmented or if telnet services are disabled, limiting attacker access to isolated network segments.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires scripted UDP packet exchange and knowledge of the leaked private key. Attackers must be on the local network.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

Check vendor website for firmware updates. If available, download and apply latest firmware following vendor instructions.

🔧 Temporary Workarounds

Disable telnet service

linux

Prevent telnetd_startup service from running to block exploitation vector

systemctl stop telnetd_startup
systemctl disable telnetd_startup

Network segmentation

all

Isolate affected devices on separate VLANs with strict access controls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from critical systems
  • Deploy network monitoring to detect UDP packet patterns associated with the exploit

🔍 How to Verify

Check if Vulnerable:

Check firmware version via device web interface or CLI. Look for telnetd_startup service running and check for hard-coded RSA keys in firmware files.

Check Version:

Check device web interface or use vendor-specific CLI commands for firmware version

Verify Fix Applied:

Verify telnetd_startup service is disabled or removed. Confirm no unauthorized telnet connections are possible.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected telnet connections from local IPs
  • telnetd_startup service spawning shells
  • Root login via telnet from unauthorized sources

Network Indicators:

  • UDP packets to port 23/2323 with specific patterns
  • Telnet traffic from unexpected internal IPs
  • Scripted UDP exchanges to telnet ports

SIEM Query:

source_port=23 OR source_port=2323 AND protocol=UDP AND (payload_contains="RSA" OR pattern_matches_exploit_script)

🔗 References

📤 Share & Export