CVE-2023-23906
📋 TL;DR
This vulnerability allows remote unauthenticated attackers to execute critical functions on SkyBridge MB-A100/110 devices without authentication. Attackers can reboot the product, potentially causing denial of service. Organizations using SkyBridge MB-A100/110 firmware version 4.2.0 or earlier are affected.
💻 Affected Systems
- SkyBridge MB-A100
- SkyBridge MB-A110
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could repeatedly reboot the device, causing sustained denial of service and disrupting network operations.
Likely Case
Remote attackers reboot the device, causing temporary service disruption until manual intervention.
If Mitigated
With proper network segmentation and access controls, impact is limited to denial of service within isolated network segments.
🎯 Exploit Status
The vulnerability requires no authentication and minimal technical skill to exploit via network requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 4.2.1 or later
Vendor Advisory: https://www.seiko-sol.co.jp/archives/73969/
Restart Required: Yes
Instructions:
1. Download firmware version 4.2.1 or later from Seiko Solutions website. 2. Upload firmware to device via web interface. 3. Apply firmware update. 4. Reboot device to complete installation.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to SkyBridge devices to trusted management networks only
Firewall Rules
allBlock external access to SkyBridge management interfaces
🧯 If You Can't Patch
- Isolate SkyBridge devices on separate VLAN with strict access controls
- Implement network monitoring for reboot attempts and unauthorized access
🔍 How to Verify
Check if Vulnerable:
Check firmware version in device web interface. If version is 4.2.0 or earlier, device is vulnerable.
Check Version:
Check via web interface at http://[device-ip]/ or via SSH if enabled
Verify Fix Applied:
Verify firmware version is 4.2.1 or later in device web interface after update.
📡 Detection & Monitoring
Log Indicators:
- Unexpected reboot events
- Unauthenticated access attempts to management functions
Network Indicators:
- HTTP requests to reboot endpoints from unauthorized sources
SIEM Query:
source="skybridge" AND (event="reboot" OR event="unauthorized_access")
🔗 References
- https://jvn.jp/en/jp/JVN40604023/
- https://www.seiko-sol.co.jp/archives/73969/
- https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/
- https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/
- https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/
- https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/
- https://jvn.jp/en/jp/JVN40604023/
- https://www.seiko-sol.co.jp/archives/73969/
- https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/
- https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/
- https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/
- https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/