CVE-2024-5403

7.2 HIGH

📋 TL;DR

This vulnerability allows remote attackers with administrator privileges to execute arbitrary system commands on ASKEY 5G NR Small Cell devices due to improper input filtering. It affects organizations using these cellular infrastructure devices. Attackers can gain full control of affected systems.

💻 Affected Systems

Products:
  • ASKEY 5G NR Small Cell
Versions: Specific versions not detailed in references, but all versions with vulnerable functionality are affected
Operating Systems: Embedded Linux-based system
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator privileges to exploit. Devices with default admin credentials or credential compromise are particularly vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the small cell device allowing attackers to disrupt cellular service, intercept communications, pivot to internal networks, or deploy persistent malware.

🟠

Likely Case

Attackers with stolen or compromised admin credentials gain full system control to modify configurations, disrupt service, or use the device as a foothold for further attacks.

🟢

If Mitigated

With proper network segmentation, credential protection, and monitoring, impact is limited to the isolated device with quick detection and remediation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but command injection is straightforward once authenticated. Attackers with credential access can easily weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-7821-87e38-1.html

Restart Required: Yes

Instructions:

1. Contact ASKEY for specific firmware update. 2. Download latest firmware from vendor portal. 3. Backup current configuration. 4. Apply firmware update via admin interface. 5. Restart device. 6. Verify fix and restore configuration if needed.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to specific trusted IP addresses and networks only

Configure firewall rules to restrict admin interface access to management VLAN only

Credential Hardening

all

Implement strong, unique admin passwords and enable multi-factor authentication if supported

Change default credentials to complex passwords
Enable MFA if available in admin settings

🧯 If You Can't Patch

  • Isolate affected devices in dedicated network segments with strict firewall rules
  • Implement network monitoring and IDS/IPS rules to detect command injection attempts

🔍 How to Verify

Check if Vulnerable:

Check if device responds to command injection attempts in admin interface input fields (test in controlled environment only)

Check Version:

Check firmware version in device admin interface under System Information

Verify Fix Applied:

After patching, attempt to reproduce command injection in test environment to confirm remediation

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed admin login attempts followed by successful login
  • Suspicious commands in web server logs

Network Indicators:

  • Unusual outbound connections from small cell device
  • Command and control traffic patterns
  • Unexpected protocol usage

SIEM Query:

source="small-cell-logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*)")

🔗 References

📤 Share & Export