CVE-2024-8452

7.5 HIGH

📋 TL;DR

This vulnerability affects certain PLANET Technology switch models that use obsolete cryptographic algorithms in their SNMPv3 implementation. Attackers can exploit weak authentication and encryption protocols to obtain plaintext SNMPv3 credentials. Organizations using affected PLANET switch models are at risk.

💻 Affected Systems

Products:
  • PLANET Technology switches (specific models not detailed in references)
Versions: Not specified in references
Operating Systems: Switch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects switches with SNMPv3 enabled using weak cryptographic algorithms. The exact models and firmware versions are not detailed in the provided references.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative access to network switches, enabling network disruption, traffic interception, configuration changes, and lateral movement to other systems.

🟠

Likely Case

Attackers obtain SNMP credentials to monitor network traffic, gather configuration information, and potentially modify switch settings for persistence or data exfiltration.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the affected switch with no lateral movement to critical systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to SNMP service and knowledge of weak algorithm vulnerabilities. No public exploit code is mentioned in the references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-8054-231ad-2.html

Restart Required: No

Instructions:

1. Check PLANET Technology website for firmware updates. 2. If update available, download and apply following vendor instructions. 3. Verify SNMPv3 uses strong algorithms after update.

🔧 Temporary Workarounds

Disable SNMPv3 or use SNMPv1/v2c with ACLs

all

Disable SNMPv3 service entirely or revert to SNMPv1/v2c with strict access control lists

# Configuration depends on specific switch model
# Consult PLANET switch documentation for SNMP configuration commands

Implement network segmentation

all

Restrict SNMP access to management network only

# Configure switch ACLs to limit SNMP to management IPs
# Example (model-specific): ip access-list standard SNMP-MGMT
permit 10.0.1.0 0.0.0.255
deny any

🧯 If You Can't Patch

  • Disable SNMPv3 entirely and use alternative management protocols
  • Implement strict network access controls to limit SNMP traffic to trusted management stations only

🔍 How to Verify

Check if Vulnerable:

Check switch configuration for SNMPv3 settings and verify if weak algorithms (MD5, DES, 3DES) are enabled. Use SNMP walk tools to test authentication.

Check Version:

# Model-specific command, typically: show version or show system

Verify Fix Applied:

After applying workarounds, test SNMPv3 access attempts fail or confirm SNMPv3 is disabled. Verify only strong algorithms (SHA, AES) are configured if SNMPv3 remains enabled.

📡 Detection & Monitoring

Log Indicators:

  • Failed SNMP authentication attempts
  • SNMP configuration changes
  • Unusual SNMP queries from unauthorized sources

Network Indicators:

  • SNMPv3 traffic to/from non-management stations
  • SNMP traffic using weak encryption protocols

SIEM Query:

source="switch_logs" AND (event="SNMP*" OR protocol="SNMP") AND (action="failed" OR user="unknown")

🔗 References

📤 Share & Export