CVE-2024-8450

8.6 HIGH

📋 TL;DR

This vulnerability affects certain PLANET Technology switch models that have a hard-coded SNMPv1 community string, allowing unauthorized remote attackers to access the SNMP service with read-write privileges. This enables attackers to modify switch configurations, disrupt network operations, and potentially gain further network access. Organizations using affected PLANET switch models are at risk.

💻 Affected Systems

Products:
  • PLANET Technology switches (specific models not detailed in provided references)
Versions: Not specified in provided references
Operating Systems: Switch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects SNMPv1 service on vulnerable switches. The hard-coded community string provides read-write access by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over network switches, enabling them to reconfigure network topology, intercept traffic, disable network segments, and use switches as pivot points to attack other systems.

🟠

Likely Case

Attackers modify switch configurations to disrupt network operations, create network loops causing broadcast storms, or redirect traffic for interception.

🟢

If Mitigated

With proper network segmentation and SNMP access controls, impact is limited to the specific vulnerable switch and its directly connected devices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of the hard-coded community string and network access to the SNMP service. SNMPv1 is unencrypted, making traffic interception trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-8050-52f32-2.html

Restart Required: No

Instructions:

1. Contact PLANET Technology for firmware updates or patches. 2. Check vendor advisory for specific remediation guidance. 3. Apply any available firmware updates following vendor instructions.

🔧 Temporary Workarounds

Disable SNMPv1 Service

all

Completely disable the vulnerable SNMPv1 service on affected switches

Switch configuration commands vary by model - consult switch documentation for SNMP disable commands

Implement Network Access Controls

all

Restrict SNMP access to trusted management networks only using ACLs

Configure switch ACLs to permit SNMP only from authorized management IP addresses

🧯 If You Can't Patch

  • Isolate vulnerable switches in separate VLANs with strict firewall rules
  • Implement network monitoring for SNMP traffic from unauthorized sources

🔍 How to Verify

Check if Vulnerable:

Attempt SNMP queries using the hard-coded community string (not disclosed in public references) to test for read-write access

Check Version:

Check switch firmware version via console or web interface (commands vary by model)

Verify Fix Applied:

Test SNMP access after remediation - successful queries should fail or return access denied

📡 Detection & Monitoring

Log Indicators:

  • SNMP authentication failures
  • SNMP set operations from unauthorized sources
  • Configuration changes via SNMP

Network Indicators:

  • SNMPv1 traffic to switch management interfaces
  • SNMP traffic from unexpected source IPs

SIEM Query:

source_port=161 OR destination_port=161 AND (protocol=udp AND (snmp.community_string="hardcoded_string" OR snmp.version=1))

🔗 References

📤 Share & Export