CVE-2023-37214

9.8 CRITICAL

📋 TL;DR

CVE-2023-37214 is a command injection vulnerability in Heights Telecom ERO1xS-Pro Dual-Band firmware that allows attackers to execute arbitrary commands on affected devices. This affects all systems running the vulnerable firmware version. Attackers can potentially take full control of the device.

💻 Affected Systems

Products:
  • Heights Telecom ERO1xS-Pro Dual-Band
Versions: FW version BZ_ERO1XP.025
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the specified firmware version are vulnerable by default

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to network infiltration, data exfiltration, and use as a pivot point for further attacks

🟠

Likely Case

Remote code execution allowing attackers to modify device configuration, intercept traffic, or deploy malware

🟢

If Mitigated

Limited impact if network segmentation and strict access controls prevent external access

🌐 Internet-Facing: HIGH - Devices exposed to the internet can be directly exploited without authentication
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit the vulnerability

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-77 indicates improper neutralization of special elements used in a command, suggesting straightforward exploitation

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.gov.il/en/Departments/faq/cve_advisories

Restart Required: Yes

Instructions:

1. Check vendor advisory for patch availability. 2. If patch exists, download from vendor. 3. Apply firmware update via device management interface. 4. Reboot device.

🔧 Temporary Workarounds

Network Isolation

all

Isolate affected devices from untrusted networks and internet

Access Control

all

Restrict network access to management interfaces using firewall rules

🧯 If You Can't Patch

  • Remove devices from internet-facing positions immediately
  • Implement strict network segmentation and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device web interface or via SSH: show version

Check Version:

show version or check web interface system information

Verify Fix Applied:

Verify firmware version has been updated from BZ_ERO1XP.025

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Unexpected configuration changes
  • Failed authentication attempts to management interfaces

Network Indicators:

  • Unusual outbound connections from device
  • Traffic to unexpected destinations
  • Port scanning originating from device

SIEM Query:

source="device_logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*")

🔗 References

📤 Share & Export