CVE-2023-36670

9.8 CRITICAL

📋 TL;DR

A critical command injection vulnerability in Kratos NGC-IDU 9.1.0.4 allows remote attackers to execute arbitrary Linux commands as root via crafted TCP requests. This affects organizations using the vulnerable Kratos network gateway device, potentially leading to complete system compromise.

💻 Affected Systems

Products:
  • Kratos NGC-IDU
Versions: 9.1.0.4
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the specified version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system takeover with root access, data exfiltration, lateral movement to other network segments, and persistent backdoor installation.

🟠

Likely Case

Unauthorized command execution leading to service disruption, configuration changes, or credential theft from the compromised device.

🟢

If Mitigated

Limited impact if device is isolated behind firewalls with strict network access controls and monitored for anomalous traffic.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote exploitation via TCP requests without authentication makes this highly accessible to attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.kratosdefense.com/vulnerability-advisories/cve-2023-36670

Restart Required: Yes

Instructions:

1. Contact Kratos support for patch availability. 2. Apply the security update following vendor instructions. 3. Restart the device to activate the fix.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the device behind firewalls to restrict TCP access to trusted sources only.

Access Control Lists

all

Implement network ACLs to block unauthorized TCP connections to the vulnerable service.

🧯 If You Can't Patch

  • Deploy network monitoring to detect anomalous TCP traffic patterns to the device.
  • Implement strict outbound filtering to prevent command-and-control communication from compromised devices.

🔍 How to Verify

Check if Vulnerable:

Check device version via administrative interface or console; if running NGC-IDU 9.1.0.4, it is vulnerable.

Check Version:

Consult device documentation for version check commands specific to Kratos NGC-IDU.

Verify Fix Applied:

Verify the device version has been updated to a patched release as specified in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution logs
  • Failed authentication attempts to root
  • Unexpected process spawns

Network Indicators:

  • Anomalous TCP connections to device ports
  • Suspicious payloads in network traffic

SIEM Query:

source="ngc-idu" AND (event="command_execution" OR event="root_access")

🔗 References

📤 Share & Export