CVE-2022-28371

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authentication on Verizon 5G Home LVSKIHP devices by extracting static certificates embedded in the firmware. Anyone using affected Verizon 5G Home IDU and ODU devices with vulnerable firmware versions is at risk.

💻 Affected Systems

Products:
  • Verizon 5G Home LVSKIHP InDoorUnit (IDU)
  • Verizon 5G Home LVSKIHP OutDoorUnit (ODU)
Versions: IDU 3.4.66.162 and ODU 3.33.101.0
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with these firmware versions are vulnerable as the static certificates are embedded in firmware.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing unauthorized access to network traffic, device configuration, and potential lateral movement to connected networks.

🟠

Likely Case

Unauthorized access to device management interfaces, configuration tampering, and potential service disruption.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH - Devices are typically internet-facing home gateways, making them directly accessible to attackers.
🏢 Internal Only: LOW - This primarily affects internet-facing devices, though compromised devices could be used to pivot to internal networks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires firmware download and certificate extraction, which is documented in public research.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.verizon.com/info/reportsecurityvulnerability/

Restart Required: Yes

Instructions:

1. Contact Verizon support for firmware updates. 2. Check for available updates through device management interface. 3. Apply any available firmware updates. 4. Reboot device after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from critical internal networks using VLANs or firewalls.

Access Control Lists

all

Restrict management interface access to trusted IP addresses only.

🧯 If You Can't Patch

  • Replace affected devices with updated hardware if available.
  • Disable remote management features if not required.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version through web interface or SSH if accessible. Vulnerable versions are IDU 3.4.66.162 and ODU 3.33.101.0.

Check Version:

Check via device web interface at http://[device-ip]/ or through device management console.

Verify Fix Applied:

Verify firmware version has been updated to a version later than the vulnerable releases.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to CRTC/ODU RPC endpoints
  • Firmware download attempts from unusual sources
  • Certificate validation failures

Network Indicators:

  • Unusual traffic to device management ports (typically 443, 80)
  • Connections using extracted certificate credentials

SIEM Query:

source_ip=* AND (dest_port=443 OR dest_port=80) AND dest_ip=[device_ip] AND (user_agent CONTAINS 'curl' OR user_agent CONTAINS 'wget')

🔗 References

📤 Share & Export