CVE-2024-47865

5.3 MEDIUM

📋 TL;DR

A missing authentication vulnerability in Rakuten Turbo 5G firmware allows remote unauthenticated attackers to update or downgrade device firmware. This affects all devices running firmware version V1.3.18 and earlier. Attackers could potentially install malicious firmware to gain control of affected devices.

💻 Affected Systems

Products:
  • Rakuten Turbo 5G
Versions: V1.3.18 and earlier
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with default configurations are vulnerable. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker installs malicious firmware with backdoor, gaining persistent remote access to device, intercepting all network traffic, and using device as pivot point into internal networks.

🟠

Likely Case

Attacker downgrades firmware to older vulnerable version or installs firmware with known exploits to compromise device functionality.

🟢

If Mitigated

If network segmentation and firewall rules prevent external access to management interface, impact is limited to internal attackers with network access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability requires sending unauthenticated requests to firmware update endpoint. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V1.3.19 or later

Vendor Advisory: https://network.mobile.rakuten.co.jp/internet/turbo/information/news/3184/

Restart Required: Yes

Instructions:

1. Log into device management interface. 2. Navigate to firmware update section. 3. Check for and apply available updates. 4. Reboot device after update completes.

🔧 Temporary Workarounds

Network segmentation

all

Isolate affected devices from internet and restrict access to management interfaces

Firewall rules

linux

Block external access to device management ports (typically 80/443 for web interface)

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Segment affected devices on isolated VLAN with no internet access
  • Implement strict firewall rules to block all external access to device management interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device web interface or via SSH if available. Compare against vulnerable versions.

Check Version:

Check device web interface under System Information or Settings > About

Verify Fix Applied:

Verify firmware version is V1.3.19 or later. Attempt to access firmware update endpoint without authentication should fail.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated firmware update attempts
  • Firmware version changes without authorized user activity
  • HTTP POST requests to firmware update endpoints from unauthorized IPs

Network Indicators:

  • HTTP POST requests to /cgi-bin/firmware_update or similar endpoints without authentication headers
  • Unusual firmware download traffic patterns

SIEM Query:

source="device_logs" AND (uri_path="*firmware*" OR uri_path="*update*") AND http_method="POST" AND NOT user_agent="*management_interface*"

🔗 References

📤 Share & Export