CVE-2024-29167

7.2 HIGH

📋 TL;DR

This vulnerability allows remote authenticated attackers with administrative privileges to execute arbitrary operating system commands on SVR-116 devices by sending specially crafted requests. It affects systems running SVR-116 firmware version 1.6.0.30028871. Attackers can gain full system control through command injection.

💻 Affected Systems

Products:
  • SVR-116
Versions: Firmware version 1.6.0.30028871
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative privileges to exploit. Default administrative accounts may be vulnerable if credentials are known or compromised.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install persistent backdoors, steal sensitive data, pivot to other network systems, or render the device inoperable.

🟠

Likely Case

Attackers with administrative credentials gain remote code execution to deploy malware, exfiltrate configuration data, or disrupt device functionality.

🟢

If Mitigated

With proper network segmentation and administrative access controls, impact is limited to the affected device only.

🌐 Internet-Facing: HIGH if administrative interface is exposed to internet, as authenticated attackers can execute arbitrary commands remotely.
🏢 Internal Only: HIGH for internal networks, as authenticated attackers on the network can exploit this vulnerability to gain system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative credentials. The vulnerability is a command injection (CWE-78) that can be exploited through crafted requests to the device interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://jvn.jp/en/vu/JVNVU93932313/

Restart Required: Yes

Instructions:

1. Monitor vendor for firmware updates. 2. Check vendor advisory for patching information. 3. Apply firmware update when available. 4. Restart device after update.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative access to trusted IP addresses and networks only

Configure firewall rules to restrict access to administrative interface from specific IP ranges

Implement Network Segmentation

all

Isolate SVR-116 devices in separate network segments

Configure VLANs or network zones to separate SVR-116 from critical systems

🧯 If You Can't Patch

  • Remove administrative interface from internet exposure immediately
  • Implement strict access controls and monitor for suspicious administrative activity

🔍 How to Verify

Check if Vulnerable:

Check firmware version via device web interface or CLI. If version is 1.6.0.30028871, device is vulnerable.

Check Version:

Check via device web interface or use vendor-specific CLI commands

Verify Fix Applied:

Verify firmware version has been updated to a version later than 1.6.0.30028871

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative login patterns
  • Suspicious command execution in system logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from SVR-116 device
  • Traffic patterns indicating command execution

SIEM Query:

source="SVR-116" AND (event_type="admin_login" OR event_type="command_execution")

🔗 References

📤 Share & Export