Service Vulnerability in Microhard IPn4G Products
CVE-2018-25143

8.7HIGH

Key Information:

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2018-25143?

Microhard Systems IPn4G version 1.1.0 features a service vulnerability that permits authenticated users to activate a limited SSH shell using the default 'msshc' user. Through this vulnerability, malicious actors can leverage a specially crafted 'ping' command in the NcFTP environment, which may allow them to escape the restricted shell, thus gaining the ability to execute commands with root privileges. This poses a significant security risk as it compromises the integrity and confidentiality of the system.

Affected Version(s)

Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Backdoor Jailbreak IPn4G 1.1.0 build 1098

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

LiquidWorm as Gjoko Krstic of Zero Science Lab
.
CVE-2018-25143 : Service Vulnerability in Microhard IPn4G Products