CVE-2023-24049

9.8 CRITICAL

📋 TL;DR

CVE-2023-24049 is a privilege escalation vulnerability in Connectize AC21000 G6 routers due to poor credential management. Attackers can exploit this to gain administrative access to the router. This affects users of Connectize AC21000 G6 routers with firmware version 641.139.1.1256.

💻 Affected Systems

Products:
  • Connectize AC21000 G6 Dual-Band Gigabit WiFi Router
Versions: Firmware version 641.139.1.1256
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the affected firmware version are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full router compromise allowing attackers to intercept all network traffic, modify DNS settings, install malware, and pivot to internal network devices.

🟠

Likely Case

Router takeover enabling network traffic monitoring, credential theft, and device configuration changes.

🟢

If Mitigated

Limited impact if strong network segmentation and monitoring are in place, though router control would still be lost.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Attackers would need initial network access, but once obtained, router compromise enables lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires initial access to router management interface but leverages weak credential management for privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with Connectize for updated firmware

Vendor Advisory: https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/

Restart Required: Yes

Instructions:

1. Check Connectize website for firmware updates. 2. Download latest firmware. 3. Access router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Change Default Credentials

all

Change all default passwords and use strong, unique credentials for router administration.

Restrict Admin Access

all

Limit router admin interface access to specific IP addresses or disable remote administration.

🧯 If You Can't Patch

  • Replace vulnerable router with a different model from a vendor with better security practices
  • Implement network segmentation to isolate the router from critical internal systems

🔍 How to Verify

Check if Vulnerable:

Access router admin interface and check firmware version in system settings.

Check Version:

Check router web interface or use nmap/router scanning tools to identify firmware version

Verify Fix Applied:

Verify firmware version has been updated to a version later than 641.139.1.1256.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful admin login
  • Unusual configuration changes in router logs
  • Administrative access from unexpected IP addresses

Network Indicators:

  • DNS settings changed unexpectedly
  • New port forwarding rules added
  • Unusual outbound traffic from router

SIEM Query:

source="router_logs" AND (event="admin_login" OR event="config_change") | stats count by src_ip

🔗 References

📤 Share & Export