Search criteria
2 vulnerabilities found for Nova 243 by Baicells
CVE-2023-24022 (GCVE-0-2023-24022)
Vulnerability from cvelistv5 – Published: 2023-01-24 15:51 – Updated: 2025-04-02 13:35
VLAI?
Summary
Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.)
Severity ?
10 (Critical)
CWE
- CWE-284 - Improper Access Control
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
Credits
Baicells Security Team
Baicells Support Manager Blake Volk
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:49:08.917Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability"
},
{
"tags": [
"patch",
"x_transferred"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"tags": [
"release-notes",
"x_transferred"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-24022",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-02T13:35:16.997346Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-02T13:35:30.752Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageName": "3.7.11.3",
"platforms": [
"RTS"
],
"product": "Nova 227",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.7.11.3",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "3.7.11.3",
"platforms": [
"RTS"
],
"product": "Nova 233",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.7.11.3",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "3.7.11.3",
"platforms": [
"RTS"
],
"product": "Nova 243",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6 ",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.7.11.3",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "remediation developer",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Baicells Security Team"
},
{
"lang": "en",
"type": "analyst",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Baicells Support Manager Blake Volk "
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eBaicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.) \u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.) \n"
}
],
"impacts": [
{
"capecId": "CAPEC-395",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-395 Bypassing Electronic Locks and Access Controls"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284: Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-01-26T06:03:10.975Z",
"orgId": "084566ad-deee-4e89-acff-6b7b1bf9d4b7",
"shortName": "Baicells"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability"
},
{
"tags": [
"patch"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"tags": [
"release-notes"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eBaicells recommends that all customers currently running an earlier version of RTS/RTD upgrade their products to the 3.7.11.6 firmware.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Baicells recommends that all customers currently running an earlier version of RTS/RTD upgrade their products to the 3.7.11.6 firmware.\n"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Hard Coded Credential Crypt Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "084566ad-deee-4e89-acff-6b7b1bf9d4b7",
"assignerShortName": "Baicells",
"cveId": "CVE-2023-24022",
"datePublished": "2023-01-24T15:51:17.731Z",
"dateReserved": "2023-01-20T19:38:53.748Z",
"dateUpdated": "2025-04-02T13:35:30.752Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-24022 (GCVE-0-2023-24022)
Vulnerability from nvd – Published: 2023-01-24 15:51 – Updated: 2025-04-02 13:35
VLAI?
Summary
Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.)
Severity ?
10 (Critical)
CWE
- CWE-284 - Improper Access Control
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
Credits
Baicells Security Team
Baicells Support Manager Blake Volk
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:49:08.917Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability"
},
{
"tags": [
"patch",
"x_transferred"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"tags": [
"release-notes",
"x_transferred"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-24022",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-02T13:35:16.997346Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-02T13:35:30.752Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageName": "3.7.11.3",
"platforms": [
"RTS"
],
"product": "Nova 227",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.7.11.3",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "3.7.11.3",
"platforms": [
"RTS"
],
"product": "Nova 233",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.7.11.3",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "3.7.11.3",
"platforms": [
"RTS"
],
"product": "Nova 243",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6 ",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.7.11.3",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "remediation developer",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Baicells Security Team"
},
{
"lang": "en",
"type": "analyst",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Baicells Support Manager Blake Volk "
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eBaicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.) \u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.) \n"
}
],
"impacts": [
{
"capecId": "CAPEC-395",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-395 Bypassing Electronic Locks and Access Controls"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284: Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-01-26T06:03:10.975Z",
"orgId": "084566ad-deee-4e89-acff-6b7b1bf9d4b7",
"shortName": "Baicells"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability"
},
{
"tags": [
"patch"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"tags": [
"release-notes"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eBaicells recommends that all customers currently running an earlier version of RTS/RTD upgrade their products to the 3.7.11.6 firmware.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Baicells recommends that all customers currently running an earlier version of RTS/RTD upgrade their products to the 3.7.11.6 firmware.\n"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Hard Coded Credential Crypt Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "084566ad-deee-4e89-acff-6b7b1bf9d4b7",
"assignerShortName": "Baicells",
"cveId": "CVE-2023-24022",
"datePublished": "2023-01-24T15:51:17.731Z",
"dateReserved": "2023-01-20T19:38:53.748Z",
"dateUpdated": "2025-04-02T13:35:30.752Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}