CVE-2022-28373

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers on the local network to execute arbitrary commands as root on Verizon 5G Home LVSKIHP InDoorUnit devices. The issue stems from improper input sanitization in the crtcrpc JSON listener, enabling shell injection attacks. Only users of specific Verizon 5G modem hardware with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Verizon 5G Home LVSKIHP InDoorUnit (IDU)
Versions: 3.4.66.162
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects specific Verizon 5G modem hardware models; requires attacker to be on the same local network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise with root-level remote code execution, allowing attackers to intercept/modify network traffic, install persistent malware, or pivot to other network devices.

🟠

Likely Case

Local network attacker gains full control of the modem/router, enabling traffic monitoring, credential theft, and network reconnaissance.

🟢

If Mitigated

If network segmentation isolates the device and restricts local network access, impact is limited to denial of service or configuration changes.

🌐 Internet-Facing: LOW - The vulnerability requires local network access; the service is not directly exposed to the internet.
🏢 Internal Only: HIGH - Any attacker on the local network can exploit this without authentication to gain root access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available in GitHub repository; exploitation requires only network access and knowledge of the target IP.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.verizon.com/info/reportsecurityvulnerability/

Restart Required: No

Instructions:

Contact Verizon support for firmware updates; check for available updates through the device web interface or mobile app.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the modem/router on a separate VLAN to limit lateral movement from compromised devices.

Access Control Lists

all

Implement firewall rules to restrict access to the modem's management interface (typically port 80/443) to trusted management hosts only.

🧯 If You Can't Patch

  • Replace vulnerable hardware with a different model or manufacturer
  • Disable remote management features and use wired connections only

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device web interface (typically at http://192.168.0.1 or http://192.168.1.1) under Settings > About or System Information.

Check Version:

curl -s http://192.168.0.1/cgi-bin/luci/ | grep -i version

Verify Fix Applied:

Verify firmware version has been updated to a version later than 3.4.66.162 through the device web interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /cgi-bin/luci paths
  • Shell command execution in system logs
  • Unexpected process creation as root

Network Indicators:

  • Unusual outbound connections from modem IP
  • Traffic to/from modem on non-standard ports
  • HTTP requests with shell metacharacters in parameters

SIEM Query:

source="modem_logs" AND (url="*crtcrpc*" OR cmd="*sh*" OR user="root")

🔗 References

📤 Share & Export