CVE-2023-1778

10.0 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to gain superuser access to GajShield Data Security Firewall devices using default credentials. Attackers can execute arbitrary commands with administrative privileges via web interface or SSH. All systems running vulnerable firmware versions without password changes are affected.

💻 Affected Systems

Products:
  • GajShield Data Security Firewall
Versions: All firmware versions prior to v4.28, except v4.21
Operating Systems: Embedded firewall OS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable in default configuration with unchanged credentials. Both web management interface and SSH service are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to reconfigure firewall rules, intercept network traffic, install persistent backdoors, and pivot to internal networks.

🟠

Likely Case

Unauthorized administrative access leading to network configuration changes, data exfiltration, and use as attack launch point.

🟢

If Mitigated

No impact if default credentials were changed or devices are not internet-facing with proper access controls.

🌐 Internet-Facing: HIGH - Direct remote exploitation possible via exposed web interface or SSH ports.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of default credentials and network access to management interfaces.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v4.28

Vendor Advisory: https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0119

Restart Required: Yes

Instructions:

1. Download firmware v4.28 from GajShield support portal. 2. Backup current configuration. 3. Upload and install firmware update via web interface. 4. Reboot device. 5. Verify new firmware version and change all passwords.

🔧 Temporary Workarounds

Change Default Credentials

all

Immediately change all default passwords to strong, unique credentials

Restrict Management Access

all

Limit access to management interfaces to trusted IP addresses only

🧯 If You Can't Patch

  • Immediately change all default passwords to complex, unique credentials
  • Restrict management interface access to specific trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > About) or SSH login with default credentials

Check Version:

ssh admin@firewall_ip 'show version' or check web interface System > About

Verify Fix Applied:

Verify firmware version is v4.28 or later and password change is enforced

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login with default credentials
  • Configuration changes from unknown IP addresses
  • SSH connections from unexpected sources

Network Indicators:

  • Unusual outbound connections from firewall device
  • Management interface access from non-approved IPs
  • SSH brute force attempts

SIEM Query:

source="firewall_logs" (event_type="login_success" AND user="admin") OR (event_type="config_change" AND source_ip NOT IN allowed_ips)

🔗 References

📤 Share & Export