CVE-2022-27172

8.8 HIGH

📋 TL;DR

CVE-2022-27172 is a hard-coded password vulnerability in InHand Networks InRouter302's console infactory functionality that allows attackers to execute privileged operations via network requests. This affects InRouter302 devices running vulnerable firmware versions, potentially enabling remote code execution. Organizations using these routers for industrial or network infrastructure are at risk.

💻 Affected Systems

Products:
  • InHand Networks InRouter302
Versions: V3.5.37 and potentially earlier versions
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the console infactory functionality specifically; routers in factory default configuration are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing persistent backdoor installation, network traffic interception, lateral movement to connected systems, and disruption of industrial operations.

🟠

Likely Case

Unauthorized administrative access leading to configuration changes, service disruption, credential theft, and potential data exfiltration.

🟢

If Mitigated

Limited impact with proper network segmentation, but still potential for isolated router compromise.

🌐 Internet-Facing: HIGH - Routers exposed to internet are directly exploitable via network requests.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the router but no authentication; detailed technical analysis available in Talos report.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.5.45 or later (check vendor advisory for latest)

Vendor Advisory: https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf

Restart Required: Yes

Instructions:

1. Download latest firmware from InHand Networks support portal. 2. Backup current configuration. 3. Upload firmware via web interface or console. 4. Apply update and restart router. 5. Verify firmware version after reboot.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate InRouter302 devices from untrusted networks and restrict access to management interfaces.

Access Control Lists

linux

Implement firewall rules to restrict access to router management ports from authorized IPs only.

iptables -A INPUT -p tcp --dport [management_port] -s [trusted_ip] -j ACCEPT
iptables -A INPUT -p tcp --dport [management_port] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable routers from production networks
  • Monitor network traffic to/from router management interfaces for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > System Info) or console; versions V3.5.37 or earlier are vulnerable.

Check Version:

ssh admin@[router_ip] 'show version' or check web interface at System > System Info

Verify Fix Applied:

Verify firmware version is V3.5.45 or later after patching; test console infactory access with default credentials should fail.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login
  • Unexpected configuration changes
  • Console infactory access logs

Network Indicators:

  • Unusual network traffic to router management ports from unauthorized sources
  • Traffic patterns suggesting credential brute-forcing

SIEM Query:

source="router_logs" (event_type="authentication" AND result="success") AND user="default" OR source="router_logs" event_type="configuration_change"

🔗 References

📤 Share & Export