CVE-2022-38156

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated admin users to execute arbitrary Linux commands as root on Kratos SpectralNet Narrowband devices. Attackers can inject commands through crafted passwords in the web interface, leading to full system compromise. Only SpectralNet NB devices running software versions before 1.7.5 are affected.

💻 Affected Systems

Products:
  • Kratos SpectralNet Narrowband (NB)
Versions: All versions before 1.7.5
Operating Systems: Embedded Linux (device-specific)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin user access to web interface; default admin accounts may be vulnerable if credentials are known or weak.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover, data exfiltration, lateral movement to other network systems, and persistent backdoor installation.

🟠

Likely Case

Unauthorized administrative access leading to configuration changes, service disruption, or credential harvesting.

🟢

If Mitigated

Limited impact if strong network segmentation and admin account controls are implemented.

🌐 Internet-Facing: HIGH if web interface is exposed to internet, as authenticated attackers can achieve root access.
🏢 Internal Only: HIGH even internally, as any compromised admin account leads to full device compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires admin credentials but command injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.5

Vendor Advisory: https://www.kratosdefense.com/-/media/k/pdf/s/sy/os-011-spectralnet-narrowband.pdf

Restart Required: Yes

Instructions:

1. Download SpectralNet NB version 1.7.5 from Kratos support portal. 2. Backup current configuration. 3. Apply firmware update via web interface. 4. Reboot device. 5. Verify version update.

🔧 Temporary Workarounds

Restrict Admin Access

linux

Limit admin account access to trusted IP addresses only

iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

Password Policy Enforcement

all

Implement strong password policies for admin accounts

🧯 If You Can't Patch

  • Isolate device in separate VLAN with strict firewall rules
  • Disable web interface access and use console/SSH management only

🔍 How to Verify

Check if Vulnerable:

Check web interface version at System > About; if version is below 1.7.5, device is vulnerable.

Check Version:

curl -k https://device-ip/system/about | grep 'Firmware Version'

Verify Fix Applied:

Confirm version shows 1.7.5 or higher in web interface System > About page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command strings in web server logs
  • Multiple failed login attempts followed by successful admin login
  • Suspicious processes spawned from web server

Network Indicators:

  • Unusual outbound connections from device
  • Unexpected SSH or reverse shell traffic

SIEM Query:

source="spectralnet-logs" AND ("password=" OR "cmd=" OR "exec=")

🔗 References

📤 Share & Export