CVE-2023-24498

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to access a configuration page containing the switch's administrative password in plain text through an unspecified web server endpoint. It affects network switches with vulnerable web interfaces, potentially exposing administrative credentials to unauthorized users.

💻 Affected Systems

Products:
  • Unspecified network switches
Versions: Unknown specific versions
Operating Systems: Switch firmware/OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects switches with web management interfaces enabled. Specific vendor and model information not provided in available references.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to the switch, enabling network reconfiguration, traffic interception, lateral movement to other systems, and complete network compromise.

🟠

Likely Case

Unauthorized users obtain administrative credentials, leading to unauthorized configuration changes, network disruption, or credential reuse attacks against other systems.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the affected switch only, preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP access to the vulnerable endpoint. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.gov.il/en/Departments/faq/cve_advisories

Restart Required: No

Instructions:

1. Check vendor advisory for specific patch information. 2. Apply firmware updates if available. 3. Verify web interface authentication is properly implemented.

🔧 Temporary Workarounds

Disable web management interface

all

Disable the HTTP/HTTPS web server on the switch if not required for management

Switch-specific command to disable web interface

Implement network access controls

all

Restrict access to switch management interfaces to trusted IP addresses only

Switch-specific ACL configuration commands

🧯 If You Can't Patch

  • Isolate vulnerable switches in separate VLAN with strict access controls
  • Implement multi-factor authentication for switch management if supported
  • Monitor switch configuration changes and authentication logs

🔍 How to Verify

Check if Vulnerable:

Attempt to access switch web interface endpoints without authentication and check if configuration pages with passwords are accessible

Check Version:

Switch-specific show version command

Verify Fix Applied:

Verify that all web endpoints require proper authentication and no configuration data is exposed without credentials

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to web endpoints
  • Configuration file access logs
  • Failed authentication attempts followed by successful configuration access

Network Indicators:

  • HTTP requests to unusual endpoints on switch management IP
  • Traffic patterns indicating configuration scraping

SIEM Query:

source_ip=* AND dest_ip=switch_management_ip AND http_method=GET AND (uri_contains='config' OR uri_contains='password') AND auth_status='none'

🔗 References

📤 Share & Export