CVE-2022-25621

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary operating system commands on affected NEC UNIVERGE wireless access points. Attackers can gain full control of the device without authentication. All organizations using the specified UNIVERGE WA models with vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • UNIVERGE WA 1020
  • UNIVERGE WA 1510
  • UNIVERGE WA 1511
  • UNIVERGE WA 1512
  • UNIVERGE WA 2020
  • UNIVERGE WA 2021
  • UNIVERGE WA 2610-AP
  • UNIVERGE WA 2611-AP
  • UNIVERGE WA 2611E-AP
  • UNIVERGE WA WA2612-AP
Versions: Ver8.2.11 and prior
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the wireless access point allowing attackers to pivot to internal networks, intercept traffic, deploy malware, or use the device as a foothold for further attacks.

🟠

Likely Case

Attackers gain administrative control of the access point to modify configurations, intercept user traffic, or disrupt network services.

🟢

If Mitigated

If network segmentation and proper access controls are in place, impact may be limited to the wireless network segment only.

🌐 Internet-Facing: HIGH - These devices are often deployed as perimeter devices with internet exposure, making them prime targets for exploitation.
🏢 Internal Only: MEDIUM - Even internally, compromised access points can serve as pivot points for lateral movement within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated remote command execution, making exploitation straightforward for attackers with network access to the device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Ver8.2.12 or later

Vendor Advisory: https://jpn.nec.com/security-info/secinfo/nv22-004_en.html

Restart Required: Yes

Instructions:

1. Download firmware version 8.2.12 or later from NEC support portal. 2. Backup current configuration. 3. Upload new firmware via web interface. 4. Apply configuration backup. 5. Reboot device.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected access points in separate VLANs with strict firewall rules to limit potential lateral movement.

Access Control Lists

all

Implement network ACLs to restrict management interface access to trusted IP addresses only.

🧯 If You Can't Patch

  • Immediately isolate affected devices from internet and critical network segments
  • Implement strict network monitoring and alerting for suspicious traffic to/from these devices

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface at System > System Information > Firmware Version

Check Version:

No CLI command available - check via web interface only

Verify Fix Applied:

Verify firmware version shows 8.2.12 or higher in System Information page

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful access
  • Configuration changes from unknown IP addresses

Network Indicators:

  • Unusual outbound connections from access points
  • Traffic patterns inconsistent with normal wireless operations
  • Management interface access from unexpected sources

SIEM Query:

source="access_point_logs" AND (event="command_execution" OR event="config_change") AND user="unknown"

🔗 References

📤 Share & Export