CVE-2022-28704
📋 TL;DR
This vulnerability allows remote attackers to gain root access to Rakuten Casa devices via SSH when default settings are unchanged. It affects devices connected to the internet with default authentication credentials. Attackers can perform arbitrary operations with full system control.
💻 Affected Systems
- Rakuten Casa
📦 What is this software?
Casa by Rakuten
Casa by Rakuten
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise: attacker gains root access, can install malware, steal data, pivot to internal networks, or render device inoperable.
Likely Case
Remote root access leading to device takeover, data theft, and potential use as attack platform.
If Mitigated
No impact if default credentials are changed and SSH from WAN is disabled.
🎯 Exploit Status
Exploitation requires SSH access with default credentials; trivial for attackers scanning for vulnerable devices.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after AP_F_V2_0_0
Vendor Advisory: https://network.mobile.rakuten.co.jp/information/news/product/1033/
Restart Required: Yes
Instructions:
1. Update Rakuten Casa firmware to latest version. 2. Reboot device after update. 3. Verify SSH from WAN is disabled and credentials are changed.
🔧 Temporary Workarounds
Disable SSH from WAN
allPrevent SSH connections from external networks
Access web admin interface > Network settings > Disable SSH from WAN
Change Default Credentials
linuxChange root and admin passwords from defaults
ssh root@device_ip
passwd
Enter new strong password
🧯 If You Can't Patch
- Immediately change all default passwords (root and admin accounts)
- Disable SSH access from WAN/internet in device settings
- Restrict SSH access to specific IP addresses if remote access needed
🔍 How to Verify
Check if Vulnerable:
Check if SSH is accessible from internet with default credentials: 1. Attempt SSH connection from external network. 2. Try default credentials (consult device manual).
Check Version:
ssh root@device_ip 'cat /etc/version' or check web admin interface
Verify Fix Applied:
1. Confirm firmware version is updated. 2. Verify SSH from external networks fails. 3. Test that default credentials no longer work.
📡 Detection & Monitoring
Log Indicators:
- Failed SSH login attempts from external IPs
- Successful SSH logins with default usernames
- Multiple SSH connection attempts
Network Indicators:
- SSH traffic from unexpected external sources
- Unusual outbound connections from device
SIEM Query:
source="ssh_logs" (user="root" OR user="admin") AND (src_ip NOT IN internal_networks)