NSIDE-SA-2024-002
Advisory: Authentication Bypass and Remote Code Execution in AXESS 5
Unauthenticated remote attackers can bypass authorization requirements and access
protected API endpoints. Those endpoints allows for remote code execution.Details
=======Affected Product: AXESS by Axiros
Affected Versions: 4.x, 5.0.0
Vulnerability Type: Unauthenticated Remote-Code Execution
Security Risk: CRITICAL
Vendor Status: FIXED
Fixed Version: 4.3.2, 5.0.3>=
Advisory Status: PUBLISHED
Advisory URL: https://www.nsideattacklogic.de/advisories/NSIDE-SA-2024-002
Advisory URL (text only): https://www.nsideattacklogic.de/advisories/NSIDE-SA-2024-002.txt
CVE ID: CVE-2024-33898Introduction
============AXESS is a carrier grade device management server, which allows to manage TR-069
and other USP devices. It is designed for Tier 1 and Tier 2 support operators
to assist end customers with their router installations.Description
===========NSIDE decided to wait with delay the disclosure of detailed information until
19th of September 2024.
For further information for detection and patches, please refer to Axiros'
security bulletin at [0].Risk
====Unauthenticated remote attackers can fully compromise [...]