CVE-2022-28369

Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 does not validate the user-provided URL within the crtcmode function's enable_ssh sub-operation of the crtcrpc JSON listener (found at /lib/functions/wnc_jsonsh/crtcmode.sh) A remote attacker on the local network can provide a malicious URL. The data (found at that URL) is written to /usr/sbin/dropbear and then executed as root.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:verizon:lvskihp_indoorunit_firmware:3.4.66.162:*:*:*:*:*:*:*
cpe:2.3:h:verizon:lvskihp_indoorunit:-:*:*:*:*:*:*:*

History

21 Jul 2022, 02:03

Type Values Removed Values Added
CPE cpe:2.3:o:verizon:lvskihp_indoorunit_firmware:3.4.66.162:*:*:*:*:*:*:*
cpe:2.3:h:verizon:lvskihp_indoorunit:-:*:*:*:*:*:*:*
References (MISC) https://www.verizon.com/info/reportsecurityvulnerability/ - (MISC) https://www.verizon.com/info/reportsecurityvulnerability/ - Vendor Advisory
References (MISC) https://github.com/JousterL/SecWriteups/blob/main/Verizon%20LVSKIHP%205G%20Modem/readme.md - (MISC) https://github.com/JousterL/SecWriteups/blob/main/Verizon%20LVSKIHP%205G%20Modem/readme.md - Exploit, Third Party Advisory
CWE CWE-434
First Time Verizon lvskihp Indoorunit
Verizon
Verizon lvskihp Indoorunit Firmware
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

14 Jul 2022, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-14 13:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-28369

Mitre link : CVE-2022-28369

CVE.ORG link : CVE-2022-28369


JSON object : View

Products Affected

verizon

  • lvskihp_indoorunit_firmware
  • lvskihp_indoorunit
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type