CVE-2024-28288

9.8 CRITICAL

📋 TL;DR

The Ruijie RG-NBR700GW router version 10.3(4b12) lacks proper cookie verification during password reset, allowing attackers to reset the administrator password without authentication. This enables unauthorized administrative access to the router, potentially disrupting enterprise operations. Organizations using this specific router version are affected.

💻 Affected Systems

Products:
  • Ruijie RG-NBR700GW
Versions: 10.3(4b12)
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific firmware version mentioned; other versions may or may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network compromise: attacker gains administrative control, reconfigures network settings, intercepts traffic, deploys malware, or disables the router entirely.

🟠

Likely Case

Unauthorized administrative access leading to network disruption, configuration changes, or data interception.

🟢

If Mitigated

Limited impact if router is behind firewalls with strict access controls and network segmentation.

🌐 Internet-Facing: HIGH - If the router's management interface is exposed to the internet, attackers can exploit it remotely without authentication.
🏢 Internal Only: MEDIUM - Requires internal network access, but exploitation is still straightforward once inside.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires sending crafted HTTP requests to the password reset endpoint without proper cookie validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check Ruijie official website or contact vendor for firmware updates. If update available, download and apply via router's web interface or CLI.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit access to the router's web management interface to trusted IP addresses only.

Configure firewall rules to allow only specific IPs to access router management ports (typically 80/443).

Disable Remote Management

all

Turn off remote management features if not required.

Access router settings → Administration → Remote Management → Disable.

🧯 If You Can't Patch

  • Isolate the router in a separate VLAN with strict access controls.
  • Implement network monitoring for unusual administrative login attempts or configuration changes.

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface (System → Status) or CLI command 'show version'.

Check Version:

show version

Verify Fix Applied:

Verify firmware version is updated beyond 10.3(4b12) or test password reset functionality with invalid cookies.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful admin login from new IP
  • Password reset requests without valid session cookies

Network Indicators:

  • HTTP POST requests to password reset endpoints without proper cookie headers
  • Unusual administrative access from unexpected IP addresses

SIEM Query:

source="router_logs" AND (event="password_reset" OR event="admin_login") AND cookie="missing"

🔗 References

📤 Share & Export