CVE-2024-54767

7.5 HIGH

📋 TL;DR

An access control vulnerability in AVM FRITZ!Box 7530 AX routers allows unauthenticated attackers to access sensitive system information via the /juis_boxinfo.xml endpoint. This affects FRITZ!Box 7530 AX users with vulnerable configurations, particularly those with direct internet exposure. The vendor disputes the vulnerability, stating it cannot be reproduced and requires unintended configurations.

💻 Affected Systems

Products:
  • AVM FRITZ!Box 7530 AX
Versions: v7.59
Operating Systems: FRITZ!OS
Default Config Vulnerable: ✅ No
Notes: Vendor states vulnerability requires unintended configuration with direct Internet exposure. Cannot be reproduced in standard configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could obtain sensitive router configuration data, network topology information, and potentially use this information for further attacks or reconnaissance.

🟠

Likely Case

Information disclosure of router status, firmware details, and basic system information that could aid in targeted attacks.

🟢

If Mitigated

Minimal impact if proper network segmentation and access controls prevent external access to the management interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request to vulnerable endpoint. Vendor disputes existence of vulnerability in standard configurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: N/A

Restart Required: No

Instructions:

No official patch available as vendor disputes vulnerability. Ensure router is not directly exposed to internet and follow vendor security recommendations.

🔧 Temporary Workarounds

Network Segmentation

all

Ensure FRITZ!Box management interface is not directly accessible from the internet

Access Control

all

Restrict access to management interface to trusted internal networks only

🧯 If You Can't Patch

  • Ensure FRITZ!Box is behind a firewall with strict inbound rules
  • Disable remote management features and WAN access to management interface

🔍 How to Verify

Check if Vulnerable:

Attempt HTTP GET request to http://[router-ip]/juis_boxinfo.xml from unauthenticated network segment. If XML data is returned without authentication, system may be vulnerable.

Check Version:

Check FRITZ!OS version in router web interface under System → Overview

Verify Fix Applied:

Verify management interface is not accessible from untrusted networks and requires authentication for all system information endpoints.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to /juis_boxinfo.xml endpoint
  • Multiple failed authentication attempts followed by successful XML access

Network Indicators:

  • HTTP GET requests to /juis_boxinfo.xml from external IP addresses
  • Unusual traffic patterns to router management interface

SIEM Query:

source_ip=external AND destination_port=80 AND uri_path="/juis_boxinfo.xml" AND http_method="GET"

🔗 References

📤 Share & Export