CVE-2024-36454

5.3 MEDIUM

📋 TL;DR

A use of uninitialized resource vulnerability in Fujitsu IPCOM EX2 and VE2 series network devices allows attackers to cause denial of service by sending specially crafted packets. This affects devices running firmware V01L07NF0201 and earlier versions. The vulnerability can lead to system reboots or suspension of affected devices.

💻 Affected Systems

Products:
  • Fujitsu IPCOM EX2 Series
  • Fujitsu IPCOM VE2 Series
Versions: V01L07NF0201 and earlier
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Persistent denial of service attacks could render network devices unavailable, disrupting business operations and network connectivity.

🟠

Likely Case

Temporary service disruption causing device reboots or suspension, leading to brief network outages.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting exposure to malicious packets.

🌐 Internet-Facing: HIGH - Network devices directly exposed to the internet can be easily targeted with crafted packets.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted packets to vulnerable devices, which is relatively straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V01L07NF0202 or later

Vendor Advisory: https://www.fujitsu.com/jp/products/network/support/2024/ipcom-02/

Restart Required: Yes

Instructions:

1. Download latest firmware from Fujitsu support portal. 2. Backup current configuration. 3. Upload and apply firmware update. 4. Reboot device. 5. Verify firmware version.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to vulnerable devices using firewall rules and network segmentation.

Traffic Filtering

all

Implement packet filtering to block suspicious traffic patterns targeting these devices.

🧯 If You Can't Patch

  • Isolate vulnerable devices in separate network segments with strict access controls.
  • Implement network monitoring and intrusion detection to identify exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check firmware version via device web interface or CLI. Vulnerable if version is V01L07NF0201 or earlier.

Check Version:

Check via device web interface under System Information or use vendor-specific CLI commands.

Verify Fix Applied:

Confirm firmware version is V01L07NF0202 or later after applying update.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • System suspension events
  • Connection resets

Network Indicators:

  • Unusual packet patterns to device management interfaces
  • Spike in malformed packets

SIEM Query:

Search for: device_type="IPCOM" AND (event="reboot" OR event="suspension")

🔗 References

📤 Share & Export