Initial Release: 2021.11.24
Last Release: 2021.11.24
Summary:
An Access Control vulnerability exists in CLARO KAON CG3000, version 1.00.67, which could allow a malicious user to read or update the configuration without authentication.
This vulnerability has been assigned a (CVE)ID: CVE-2021-43483
Software Version and Fixes:
Affected Product: CLARO BR CG3000
Affected Version: 1.00.67 (and older)
Repair Version: 1.01.20
Impact:
Successful exploitation could allow a malicious user to read or update the configuration without authenticating in the WebUI.
Details:
After validating the WebUI user once (by placing the credentials), it leaves access without validation. Being connected to the same network, is possible to access, without any kind of authentication, the Wi-Fi configuration through the endpoints.
Obtaining Fixed Software:
The product will be automatically upgraded by Claro. There is no need for any action by the end-user.
Source:
The vulnerability information is provided by Alexandre Vieira. Thank him for his attention to KAON product vulnerabilities.
Revision History:
2021.11.24: Software v1.01.22 was made available to Claro in order to upgrade the CG3000.