CVE-2022-25218

The use of the RSA algorithm without OAEP, or any other padding scheme, in telnetd_startup, allows an unauthenticated attacker on the local area network to achieve a significant degree of control over the "plaintext" to which an arbitrary blob of ciphertext will be decrypted by OpenSSL's RSA_public_decrypt() function. This weakness allows the attacker to manipulate the various iterations of the telnetd startup state machine and eventually obtain a root shell on the device, by means of an exchange of crafted UDP packets. In all versions but K2 22.5.9.163 and K3C 32.1.15.93 a successful attack also requires the exploitation of a null-byte interaction error (CVE-2022-25219).
References
Link Resource
https://www.tenable.com/security/research/tra-2022-01 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:phicomm:k2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phicomm:k2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:phicomm:k3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phicomm:k3:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:phicomm:k3c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phicomm:k3c:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:phicomm:k2g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phicomm:k2g:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:phicomm:k2p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phicomm:k2p:-:*:*:*:*:*:*:*

History

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE NVD-CWE-noinfo CWE-327

17 Mar 2022, 19:21

Type Values Removed Values Added
First Time Phicomm k2p Firmware
Phicomm k3c
Phicomm k3
Phicomm k2 Firmware
Phicomm k2g Firmware
Phicomm k2p
Phicomm k2g
Phicomm k2
Phicomm k3 Firmware
Phicomm
Phicomm k3c Firmware
CVSS v2 : unknown
v3 : unknown
v2 : 9.3
v3 : 8.1
CWE NVD-CWE-noinfo
CPE cpe:2.3:h:phicomm:k2:-:*:*:*:*:*:*:*
cpe:2.3:o:phicomm:k2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phicomm:k3c:-:*:*:*:*:*:*:*
cpe:2.3:h:phicomm:k3:-:*:*:*:*:*:*:*
cpe:2.3:h:phicomm:k2g:-:*:*:*:*:*:*:*
cpe:2.3:o:phicomm:k3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:phicomm:k2p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phicomm:k2p:-:*:*:*:*:*:*:*
cpe:2.3:o:phicomm:k3c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:phicomm:k2g_firmware:*:*:*:*:*:*:*:*
References (MISC) https://www.tenable.com/security/research/tra-2022-01 - (MISC) https://www.tenable.com/security/research/tra-2022-01 - Exploit, Third Party Advisory

10 Mar 2022, 17:53

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-10 17:47

Updated : 2023-12-10 14:22


NVD link : CVE-2022-25218

Mitre link : CVE-2022-25218

CVE.ORG link : CVE-2022-25218


JSON object : View

Products Affected

phicomm

  • k2
  • k2p_firmware
  • k2g
  • k2g_firmware
  • k3c_firmware
  • k3_firmware
  • k2p
  • k3
  • k2_firmware
  • k3c
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm