CVE-2023-6198

9.3 CRITICAL

📋 TL;DR

This CVE describes a hard-coded credentials vulnerability in Baicells Snap Router BaiCE_BMI on EP3011 devices. Attackers can use these embedded credentials to gain unauthorized access to affected routers. Organizations using these Baicells devices are at risk.

💻 Affected Systems

Products:
  • Baicells Snap Router BaiCE_BMI on EP3011
Versions: All versions with hard-coded credentials in User Passwords modules
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the User Passwords modules; all default installations are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router allowing traffic interception, network pivoting, device reconfiguration, and potential lateral movement into connected networks.

🟠

Likely Case

Unauthorized administrative access to router leading to network disruption, configuration changes, and potential credential harvesting from connected devices.

🟢

If Mitigated

Limited impact if devices are behind firewalls, not internet-facing, and network segmentation prevents lateral movement from compromised routers.

🌐 Internet-Facing: HIGH - Internet-facing routers with this vulnerability are trivially exploitable and provide direct network access.
🏢 Internal Only: MEDIUM - Internal routers still vulnerable but require initial network access; risk increases if attacker gains internal foothold.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Hard-coded credentials make exploitation trivial once identified; no authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.baicells.com

Restart Required: No

Instructions:

Check Baicells website for firmware updates addressing hard-coded credentials. If available, download and apply firmware update following vendor instructions.

🔧 Temporary Workarounds

Change Default Credentials

all

Manually change all default passwords on affected routers to strong, unique credentials.

Login to router admin interface
Navigate to user/password settings
Change all passwords to strong alternatives

Network Segmentation

all

Isolate affected routers in separate network segments to limit potential lateral movement.

Configure firewall rules to restrict router access
Implement VLAN segmentation
Apply network access controls

🧯 If You Can't Patch

  • Remove affected devices from internet-facing positions immediately
  • Implement strict network access controls and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to authenticate to router using known/default credentials; check if credentials can be changed from defaults.

Check Version:

Check router web interface or CLI for firmware version information

Verify Fix Applied:

Verify that default credentials no longer work and strong unique passwords are required for authentication.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login
  • Multiple login attempts from unusual sources
  • Configuration changes from unexpected IP addresses

Network Indicators:

  • Unexpected administrative access to router management interfaces
  • Traffic patterns suggesting router compromise

SIEM Query:

source="router_logs" (event_type="authentication" AND result="success") AND user IN ["admin", "root", default_usernames]

🔗 References

📤 Share & Export