CVE-2023-22441

8.6 HIGH

📋 TL;DR

This vulnerability allows remote attackers to bypass authentication on Seiko Solutions SkyBridge devices, enabling unauthorized access to critical functions like rebooting the device or altering configuration settings. Affected products include SkyBridge MB-A200 firmware versions 01.00.05 and earlier, and SkyBridge BASIC MB-A130 firmware versions 1.4.1 and earlier.

💻 Affected Systems

Products:
  • Seiko Solutions SkyBridge MB-A200
  • Seiko Solutions SkyBridge BASIC MB-A130
Versions: MB-A200: 01.00.05 and earlier; MB-A130: 1.4.1 and earlier
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to modify settings, disrupt operations via reboots, or potentially pivot to other network systems.

🟠

Likely Case

Unauthorized configuration changes leading to service disruption or data exposure.

🟢

If Mitigated

Limited impact if devices are isolated and have proper network segmentation.

🌐 Internet-Facing: HIGH - Directly accessible devices can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this if devices are network-accessible.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the device but no authentication or special tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: MB-A200: later than 01.00.05; MB-A130: later than 1.4.1

Vendor Advisory: https://www.seiko-sol.co.jp/archives/73969/

Restart Required: Yes

Instructions:

1. Download updated firmware from Seiko Solutions website. 2. Follow vendor instructions to apply firmware update. 3. Reboot device after update.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to SkyBridge devices to only trusted management networks.

Firewall Rules

all

Implement firewall rules to block external access to SkyBridge management interfaces.

🧯 If You Can't Patch

  • Isolate affected devices in a separate VLAN with strict access controls.
  • Implement network monitoring for unauthorized access attempts to SkyBridge management interfaces.

🔍 How to Verify

Check if Vulnerable:

Check firmware version via device web interface or CLI; if version is MB-A200 ≤01.00.05 or MB-A130 ≤1.4.1, device is vulnerable.

Check Version:

Check via web interface at device IP or consult vendor documentation for CLI commands.

Verify Fix Applied:

Confirm firmware version is updated to MB-A200 >01.00.05 or MB-A130 >1.4.1 via device interface.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to management interfaces
  • Configuration changes without authentication logs

Network Indicators:

  • Unexpected traffic to SkyBridge management ports (typically HTTP/HTTPS)
  • Reboot commands from untrusted sources

SIEM Query:

source_ip NOT IN trusted_networks AND destination_port IN (80,443,8080) AND destination_ip IN skybridge_devices

🔗 References

📤 Share & Export