Search criteria
6 vulnerabilities found for rts_firmware by baicells
FKIE_CVE-2023-24508
Vulnerability from fkie_nvd - Published: 2023-01-26 21:18 - Updated: 2024-11-21 07:48
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L
9.6 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.6 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Summary
Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB and Nova 246 devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.
References
| URL | Tags | ||
|---|---|---|---|
| security@baicells.com | https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG | Release Notes, Vendor Advisory | |
| security@baicells.com | https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf | Release Notes, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:baicells:rtd_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "148B43F9-03E6-43FC-9631-94EAFB4497FB",
"versionEndExcluding": "3.7.11.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:baicells:rts_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB305C49-EC84-4C16-B961-1DAA3BC6B108",
"versionEndExcluding": "3.7.11.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:baicells:nova227:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FF244C0-5EC5-41ED-8474-23097129A903",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:baicells:nova233:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9943901-505F-495E-8B83-B6D50E2ECD26",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:baicells:nova243:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3A7D0D1-2ADE-4EB6-B2C4-060528D60598",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:baicells:nova246:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D28C47-73C1-465F-AE37-8281589DED94",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB and Nova 246 devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.\u00a0\n\n\n"
},
{
"lang": "es",
"value": "Los dispositivos Baicells Nova 227, Nova 233, Nova 243 LTE TDD eNodeB y Nova 246 con firmware a trav\u00e9s de RTS/RTD 3.6.6 son vulnerables a la explotaci\u00f3n remota del c\u00f3digo shell mediante inyecciones de comandos HTTP. Los comandos se ejecutan mediante ejecuci\u00f3n previa al inicio de sesi\u00f3n y se ejecutan con permisos de root. Los siguientes m\u00e9todos han sido probados y validados por un analista externo y se ha confirmado que son explotables. Un agradecimiento especial a Rustam Amin por proporcionar los pasos para reproducirlos."
}
],
"id": "CVE-2023-24508",
"lastModified": "2024-11-21T07:48:00.863",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.3,
"source": "security@baicells.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-01-26T21:18:19.737",
"references": [
{
"source": "security@baicells.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"source": "security@baicells.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"sourceIdentifier": "security@baicells.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "security@baicells.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-24022
Vulnerability from fkie_nvd - Published: 2023-01-26 21:18 - Updated: 2024-11-21 07:47
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.)
References
| URL | Tags | ||
|---|---|---|---|
| security@baicells.com | https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability | Patch, Vendor Advisory | |
| security@baicells.com | https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG | Release Notes, Vendor Advisory | |
| security@baicells.com | https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf | Release Notes, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| baicells | rtd_firmware | * | |
| baicells | rts_firmware | * | |
| baicells | nova227 | - | |
| baicells | nova233 | - | |
| baicells | nova243 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:baicells:rtd_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "148B43F9-03E6-43FC-9631-94EAFB4497FB",
"versionEndExcluding": "3.7.11.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:baicells:rts_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB305C49-EC84-4C16-B961-1DAA3BC6B108",
"versionEndExcluding": "3.7.11.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:baicells:nova227:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FF244C0-5EC5-41ED-8474-23097129A903",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:baicells:nova233:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9943901-505F-495E-8B83-B6D50E2ECD26",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:baicells:nova243:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3A7D0D1-2ADE-4EB6-B2C4-060528D60598",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.) \n"
},
{
"lang": "es",
"value": "Los dispositivos Baicells Nova 227, Nova 233 y Nova 243 LTE TDD eNodeB con firmware hasta RTS/RTD 3.7.11.3 tienen credenciales codificadas que se descubren f\u00e1cilmente y pueden ser utilizadas por atacantes remotos para autenticarse a trav\u00e9s de ssh. (Las credenciales se almacenan en el firmware, cifradas mediante la funci\u00f3n de cripta)."
}
],
"id": "CVE-2023-24022",
"lastModified": "2024-11-21T07:47:16.470",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0,
"source": "security@baicells.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-01-26T21:18:15.593",
"references": [
{
"source": "security@baicells.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability"
},
{
"source": "security@baicells.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"source": "security@baicells.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"sourceIdentifier": "security@baicells.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "security@baicells.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-798"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2023-24508 (GCVE-0-2023-24508)
Vulnerability from cvelistv5 – Published: 2023-01-24 22:32 – Updated: 2025-03-27 20:20
VLAI?
Summary
Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB and Nova 246 devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.
Severity ?
8.1 (High)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
Credits
Rustam Amin
Baicells Security Team
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:56:04.184Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"patch",
"x_transferred"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"tags": [
"release-notes",
"x_transferred"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-24508",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-27T20:18:56.513606Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-27T20:20:04.220Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"3.6.6"
],
"platforms": [
"RTS",
"RTD"
],
"product": "Nova 227",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.6.6",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"3.6.6"
],
"platforms": [
"RTS",
"RTD"
],
"product": "Nova 233",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.6.6",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"3.6.6"
],
"platforms": [
"RTS",
"RTD"
],
"product": "Nova 246",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.6.6",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Nova eNB would need to be configured and running on 3.6.6 firmware and older along with being accessible on the internal network or public network. If the Web interface is enabled it will allow users to exploit using the above method.\u0026nbsp;\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Nova eNB would need to be configured and running on 3.6.6 firmware and older along with being accessible on the internal network or public network. If the Web interface is enabled it will allow users to exploit using the above method.\u00a0\n\n"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Rustam Amin"
},
{
"lang": "en",
"type": "remediation developer",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Baicells Security Team"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eBaicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB and Nova 246 devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.\u0026nbsp;\u003c/span\u003e\u003cbr\u003e\u003c/p\u003e"
}
],
"value": "Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB and Nova 246 devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.\u00a0\n\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-111",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-111 JSON Hijacking (aka JavaScript Hijacking)"
}
]
},
{
"capecId": "CAPEC-31",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-01-25T18:32:36.297Z",
"orgId": "084566ad-deee-4e89-acff-6b7b1bf9d4b7",
"shortName": "Baicells"
},
"references": [
{
"tags": [
"patch"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"tags": [
"release-notes"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eBaicells recommends that all customers currently running an earlier version of RTS/RTD upgrade their products to the 3.7.11.6 firmware.\u003c/p\u003e\u003cbr\u003e"
}
],
"value": "Baicells recommends that all customers currently running an earlier version of RTS/RTD upgrade their products to the 3.7.11.6 firmware.\n\n\n"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Remote Code Execution in Baicells RTS Platform",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "084566ad-deee-4e89-acff-6b7b1bf9d4b7",
"assignerShortName": "Baicells",
"cveId": "CVE-2023-24508",
"datePublished": "2023-01-24T22:32:58.249Z",
"dateReserved": "2023-01-24T19:44:01.622Z",
"dateUpdated": "2025-03-27T20:20:04.220Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-24022 (GCVE-0-2023-24022)
Vulnerability from cvelistv5 – Published: 2023-01-24 15:51 – Updated: 2025-04-02 13:35
VLAI?
Summary
Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.)
Severity ?
10 (Critical)
CWE
- CWE-284 - Improper Access Control
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
Credits
Baicells Security Team
Baicells Support Manager Blake Volk
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:49:08.917Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability"
},
{
"tags": [
"patch",
"x_transferred"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"tags": [
"release-notes",
"x_transferred"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-24022",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-02T13:35:16.997346Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-02T13:35:30.752Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageName": "3.7.11.3",
"platforms": [
"RTS"
],
"product": "Nova 227",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.7.11.3",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "3.7.11.3",
"platforms": [
"RTS"
],
"product": "Nova 233",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.7.11.3",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "3.7.11.3",
"platforms": [
"RTS"
],
"product": "Nova 243",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6 ",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.7.11.3",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "remediation developer",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Baicells Security Team"
},
{
"lang": "en",
"type": "analyst",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Baicells Support Manager Blake Volk "
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eBaicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.) \u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.) \n"
}
],
"impacts": [
{
"capecId": "CAPEC-395",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-395 Bypassing Electronic Locks and Access Controls"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284: Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-01-26T06:03:10.975Z",
"orgId": "084566ad-deee-4e89-acff-6b7b1bf9d4b7",
"shortName": "Baicells"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability"
},
{
"tags": [
"patch"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"tags": [
"release-notes"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eBaicells recommends that all customers currently running an earlier version of RTS/RTD upgrade their products to the 3.7.11.6 firmware.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Baicells recommends that all customers currently running an earlier version of RTS/RTD upgrade their products to the 3.7.11.6 firmware.\n"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Hard Coded Credential Crypt Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "084566ad-deee-4e89-acff-6b7b1bf9d4b7",
"assignerShortName": "Baicells",
"cveId": "CVE-2023-24022",
"datePublished": "2023-01-24T15:51:17.731Z",
"dateReserved": "2023-01-20T19:38:53.748Z",
"dateUpdated": "2025-04-02T13:35:30.752Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-24508 (GCVE-0-2023-24508)
Vulnerability from nvd – Published: 2023-01-24 22:32 – Updated: 2025-03-27 20:20
VLAI?
Summary
Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB and Nova 246 devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.
Severity ?
8.1 (High)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
Credits
Rustam Amin
Baicells Security Team
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:56:04.184Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"patch",
"x_transferred"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"tags": [
"release-notes",
"x_transferred"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-24508",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-27T20:18:56.513606Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-27T20:20:04.220Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"3.6.6"
],
"platforms": [
"RTS",
"RTD"
],
"product": "Nova 227",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.6.6",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"3.6.6"
],
"platforms": [
"RTS",
"RTD"
],
"product": "Nova 233",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.6.6",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"3.6.6"
],
"platforms": [
"RTS",
"RTD"
],
"product": "Nova 246",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.6.6",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Nova eNB would need to be configured and running on 3.6.6 firmware and older along with being accessible on the internal network or public network. If the Web interface is enabled it will allow users to exploit using the above method.\u0026nbsp;\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Nova eNB would need to be configured and running on 3.6.6 firmware and older along with being accessible on the internal network or public network. If the Web interface is enabled it will allow users to exploit using the above method.\u00a0\n\n"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Rustam Amin"
},
{
"lang": "en",
"type": "remediation developer",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Baicells Security Team"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eBaicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB and Nova 246 devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.\u0026nbsp;\u003c/span\u003e\u003cbr\u003e\u003c/p\u003e"
}
],
"value": "Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB and Nova 246 devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.\u00a0\n\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-111",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-111 JSON Hijacking (aka JavaScript Hijacking)"
}
]
},
{
"capecId": "CAPEC-31",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-01-25T18:32:36.297Z",
"orgId": "084566ad-deee-4e89-acff-6b7b1bf9d4b7",
"shortName": "Baicells"
},
"references": [
{
"tags": [
"patch"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"tags": [
"release-notes"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eBaicells recommends that all customers currently running an earlier version of RTS/RTD upgrade their products to the 3.7.11.6 firmware.\u003c/p\u003e\u003cbr\u003e"
}
],
"value": "Baicells recommends that all customers currently running an earlier version of RTS/RTD upgrade their products to the 3.7.11.6 firmware.\n\n\n"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Remote Code Execution in Baicells RTS Platform",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "084566ad-deee-4e89-acff-6b7b1bf9d4b7",
"assignerShortName": "Baicells",
"cveId": "CVE-2023-24508",
"datePublished": "2023-01-24T22:32:58.249Z",
"dateReserved": "2023-01-24T19:44:01.622Z",
"dateUpdated": "2025-03-27T20:20:04.220Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-24022 (GCVE-0-2023-24022)
Vulnerability from nvd – Published: 2023-01-24 15:51 – Updated: 2025-04-02 13:35
VLAI?
Summary
Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.)
Severity ?
10 (Critical)
CWE
- CWE-284 - Improper Access Control
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
Credits
Baicells Security Team
Baicells Support Manager Blake Volk
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:49:08.917Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability"
},
{
"tags": [
"patch",
"x_transferred"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"tags": [
"release-notes",
"x_transferred"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-24022",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-02T13:35:16.997346Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-02T13:35:30.752Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageName": "3.7.11.3",
"platforms": [
"RTS"
],
"product": "Nova 227",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.7.11.3",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "3.7.11.3",
"platforms": [
"RTS"
],
"product": "Nova 233",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.7.11.3",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "3.7.11.3",
"platforms": [
"RTS"
],
"product": "Nova 243",
"vendor": "Baicells",
"versions": [
{
"changes": [
{
"at": "3.7.11.6 ",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.7.11.3",
"status": "affected",
"version": "0",
"versionType": "patch"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "remediation developer",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Baicells Security Team"
},
{
"lang": "en",
"type": "analyst",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Baicells Support Manager Blake Volk "
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eBaicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.) \u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.) \n"
}
],
"impacts": [
{
"capecId": "CAPEC-395",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-395 Bypassing Electronic Locks and Access Controls"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284: Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-01-26T06:03:10.975Z",
"orgId": "084566ad-deee-4e89-acff-6b7b1bf9d4b7",
"shortName": "Baicells"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability"
},
{
"tags": [
"patch"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG"
},
{
"tags": [
"release-notes"
],
"url": "https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6_Changelog.PDF.pdf"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eBaicells recommends that all customers currently running an earlier version of RTS/RTD upgrade their products to the 3.7.11.6 firmware.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Baicells recommends that all customers currently running an earlier version of RTS/RTD upgrade their products to the 3.7.11.6 firmware.\n"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Hard Coded Credential Crypt Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "084566ad-deee-4e89-acff-6b7b1bf9d4b7",
"assignerShortName": "Baicells",
"cveId": "CVE-2023-24022",
"datePublished": "2023-01-24T15:51:17.731Z",
"dateReserved": "2023-01-20T19:38:53.748Z",
"dateUpdated": "2025-04-02T13:35:30.752Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}