Cambium Networks released new firmware to mitigate improper access control and improper privilege management vulnerabilities in its ePMP Network Access Control product, according to a report with ICS-CERT.
All ePMP models suffer from the remotely exploitable vulnerabilities discovered by Karn Ganeshen.
Successful exploitation of these vulnerabilities may allow an attacker to access device configuration as well as make unauthorized changes to the product’s configuration.
Exploits that target these vulnerabilities are publicly available. An attacker with a low skill level would be able to leverage the vulnerability.
After a valid user has used SNMP configuration export, an attacker is able to remotely trigger device configuration backups using specific MIBs. These backups lack proper access control and may allow access to sensitive information and possibly allow for configuration changes.
CVE-2017-7918 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 6.8.
In addition, the privileges for SNMP community strings are not properly restricted, which may allow an attacker to gain access to sensitive information and possibly allow for configuration changes.
CVE-2017-7922 is the case number for this vulnerability, which has a CVSS v3 base score of 7.6.
The product mainly covers the information technology sector and it sees use on a global basis.
Rolling Meadows, IL-based Cambium recommends users with the affected products should update to firmware version 3.4-RC7 or newer. This update can be found by logging in at this location.
Cambium also recommends that users edit default SNMP configuration. Affected models come set with the default values of “public” and “private” for RO (read only) and RW (read write) community strings. Cambium recommends changing this to a random string consisting of eight or more characters in length, including both upper and lower case letters and numbers for variability.