CVE-2022-31395
📋 TL;DR
This vulnerability allows attackers to perform directory traversal attacks on Algo Communication Products Ltd. 8373 IP Zone Paging Adapter devices. Attackers can access arbitrary files on the system by sending specially crafted web requests to the /fm-data.lua endpoint. Organizations using these devices with vulnerable firmware are affected.
💻 Affected Systems
- Algo Communication Products Ltd. 8373 IP Zone Paging Adapter
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to read sensitive files, modify device configuration, or potentially execute arbitrary code leading to device takeover.
Likely Case
Unauthorized access to sensitive configuration files, credentials, or system information that could enable further attacks.
If Mitigated
Limited impact with proper network segmentation and access controls preventing external exploitation.
🎯 Exploit Status
Exploitation requires only web access to the device and knowledge of the vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor for latest firmware version
Vendor Advisory: https://www.algosolutions.com/security-advisories/
Restart Required: Yes
Instructions:
1. Log into device web interface
2. Navigate to firmware update section
3. Download latest firmware from vendor portal
4. Upload and apply firmware update
5. Reboot device after update completes
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to the device web interface
iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
Web Interface Disable
linuxDisable web interface if not required for operations
service httpd stop
chkconfig httpd off
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected devices from untrusted networks
- Deploy web application firewall (WAF) rules to block directory traversal patterns
🔍 How to Verify
Check if Vulnerable:
Check firmware version in web interface under System > Firmware or via SSH using 'cat /etc/version'
Check Version:
cat /etc/version || grep firmware /web/config
Verify Fix Applied:
Verify firmware version is updated beyond 1.7.6 and test /fm-data.lua endpoint with traversal attempts
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /fm-data.lua with ../ patterns
- Unauthorized file access attempts in system logs
Network Indicators:
- HTTP requests containing directory traversal sequences (../, ..\, etc.) to port 80/443
SIEM Query:
source="web_logs" AND (uri="/fm-data.lua" AND (request CONTAINS "../" OR request CONTAINS "..\\"))