CVE-2022-29516

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary operating system commands on affected FUJITSU Network IPCOM devices through the web console. Attackers can potentially gain full control of the device without authentication. Organizations using the listed IPCOM series products are affected.

💻 Affected Systems

Products:
  • IPCOM EX2 IN(3200, 3500)
  • IPCOM EX2 LB(1100, 3200, 3500)
  • IPCOM EX2 SC(1100, 3200, 3500)
  • IPCOM EX2 NW(1100, 3200, 3500)
  • IPCOM EX2 DC
  • IPCOM EX IN(2300, 2500, 2700)
  • IPCOM EX LB(1100, 1300, 2300, 2500, 2700)
  • IPCOM EX SC(1100, 1300, 2300, 2500, 2700)
  • IPCOM EX NW(1100, 1300, 2300, 2500, 2700)
Versions: All versions prior to vendor patches
Operating Systems: Embedded OS on IPCOM devices
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web console interface of these network devices. No specific version ranges provided in CVE description.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the network device leading to network disruption, data exfiltration, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Unauthorized access to device configuration, network traffic interception, credential harvesting, and potential use as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if device is isolated, patched, and monitored with proper network segmentation and access controls.

🌐 Internet-Facing: HIGH - CVSS 9.8 indicates critical severity with remote exploitability without authentication.
🏢 Internal Only: HIGH - Even internally, this provides attackers with a powerful foothold for lateral movement and privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVE description indicates remote unauthenticated exploitation via unspecified vectors. CVSS 9.8 suggests trivial exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions

Vendor Advisory: https://www.fujitsu.com/jp/products/network/support/2022/ipcom-01/

Restart Required: Yes

Instructions:

1. Check current firmware version on IPCOM device. 2. Download appropriate firmware update from FUJITSU support site. 3. Backup device configuration. 4. Apply firmware update following vendor instructions. 5. Verify successful update and restore configuration if needed.

🔧 Temporary Workarounds

Disable Web Console Access

all

Temporarily disable web console interface to prevent exploitation

Check device documentation for web console disable commands

Network Access Control

linux

Restrict access to web console interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Isolate affected devices in separate VLAN with strict access controls
  • Implement network monitoring and IDS/IPS rules to detect exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vendor advisory. If running unpatched firmware on affected models, assume vulnerable.

Check Version:

Check web console interface or CLI for firmware version information

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in device logs
  • Multiple failed authentication attempts followed by successful access
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from network device
  • Traffic patterns inconsistent with normal device operation

SIEM Query:

source="ipcom-device" AND (event="command_execution" OR event="configuration_change")

🔗 References

📤 Share & Export