CVE-2023-3703

10.0 CRITICAL

📋 TL;DR

Proscend ICR Series routers with firmware version 1.76 have default administrative credentials that cannot be changed. This allows attackers to gain full administrative control of affected routers. Organizations using these routers with default configurations are vulnerable.

💻 Affected Systems

Products:
  • Proscend ICR Series routers
Versions: Firmware version 1.76
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices where default credentials were not changed during initial configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router allowing traffic interception, network pivoting, credential theft, and deployment of persistent malware across the network.

🟠

Likely Case

Unauthorized administrative access leading to network reconnaissance, configuration changes, and potential data exfiltration.

🟢

If Mitigated

Limited impact if default credentials were changed during initial setup, though some devices may remain vulnerable.

🌐 Internet-Facing: HIGH - Routers with management interfaces exposed to the internet can be directly compromised by remote attackers.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this if they gain network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of default credentials and network access to management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.gov.il/en/Departments/faq/cve_advisories

Restart Required: No

Instructions:

1. Access router web interface
2. Navigate to administration settings
3. Change default administrative credentials to strong, unique passwords
4. Save configuration changes

🔧 Temporary Workarounds

Change Default Credentials

all

Immediately change all default administrative passwords on affected routers

Restrict Management Access

all

Limit management interface access to trusted IP addresses only

🧯 If You Can't Patch

  • Isolate affected routers in separate network segments with strict firewall rules
  • Implement network monitoring for unauthorized access attempts to router management interfaces

🔍 How to Verify

Check if Vulnerable:

Attempt to log into router web interface using default credentials (check vendor documentation for defaults)

Check Version:

Check firmware version in router web interface under System Information or via SSH/Telnet if enabled

Verify Fix Applied:

Verify you cannot log in with default credentials and only new credentials work

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts followed by successful login with default credentials
  • Configuration changes from unexpected IP addresses

Network Indicators:

  • Unauthorized access to router management ports (typically 80, 443, 22, 23)
  • Traffic patterns indicating router compromise

SIEM Query:

source="router_logs" (event_type="authentication" AND (username="admin" OR username="root") AND result="success")

🔗 References

📤 Share & Export