CVE-2022-26991

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in Arris routers that allows attackers to execute arbitrary commands by manipulating the TimeZone parameter in the NTP function. Attackers can gain full control of affected routers, potentially compromising all connected devices and network traffic. This affects Arris SBR-AC1900P, SBR-AC3200P, and SBR-AC1200P routers with specific vulnerable firmware versions.

💻 Affected Systems

Products:
  • Arris SBR-AC1900P
  • Arris SBR-AC3200P
  • Arris SBR-AC1200P
Versions: SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05, SBR-AC1200P 1.0.5-B05
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects routers with NTP function enabled (typically default).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise leading to full network takeover, credential theft, malware deployment to all connected devices, and persistent backdoor installation.

🟠

Likely Case

Router compromise allowing traffic interception, DNS hijacking, credential harvesting, and lateral movement to connected devices.

🟢

If Mitigated

Limited impact if routers are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices directly accessible from WAN interfaces.
🏢 Internal Only: MEDIUM - Could be exploited from internal networks if attacker gains initial access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available in GitHub repository. Exploitation requires sending crafted HTTP requests to router web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not publicly available

Restart Required: Yes

Instructions:

1. Check Arris support website for firmware updates
2. Download latest firmware for your model
3. Access router admin interface
4. Navigate to firmware update section
5. Upload and apply new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable remote administration

all

Prevent external access to router web interface

Restrict NTP access

all

Block external NTP requests if not needed

🧯 If You Can't Patch

  • Isolate routers in separate VLAN with strict firewall rules
  • Implement network monitoring for suspicious NTP-related requests

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface and compare with affected versions list.

Check Version:

Login to router web interface and navigate to System Status or About page.

Verify Fix Applied:

Verify firmware version has been updated to a version later than the vulnerable ones listed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual NTP configuration changes
  • Suspicious commands in system logs
  • Multiple failed login attempts

Network Indicators:

  • Unexpected outbound connections from router
  • DNS queries to suspicious domains
  • Unusual NTP traffic patterns

SIEM Query:

source="router.log" AND ("TimeZone" OR "ntp" OR "command injection")

🔗 References

📤 Share & Export