Unauthenticated remote attackers can bypass authorization requirements and access protected API endpoints. Those endpoints allows for remote code execution.

Introduction

AXESS is a carrier grade device management server, which allows to manage TR-069 and other USP devices. It is designed for Tier 1 and Tier 2 support operators to assist end customers with their router installations.

Description

NSIDE decided to wait with delay the disclosure of detailed information until 19th of September 2024.
For further information for detection and patches, please refer to Axiros‘ security bulletin.

Risk

Unauthenticated remote attackers can fully compromise the AXESS server and interact with all registered routers at free will, e.g. reboot them or install new firmware.

Solution/Mitigation

For further information for detection and patches, please refer to Axiros‘ security bulletin.

Disclosure Timeline

2024-04-18: Vulnerability discovered and details reported to Axiros
2024-04-18: Axiros develops security patch
2024-04-19: Axiros starts distribution of a security patch
2024-04-21: Retest of the customer application
2024-06-17: Axiros agrees to CVE publication
2024-06-25: CVE published
2024-12-17: Advisory published by NSIDE

Contact/Credits

The vulnerability was discovered during an assessment by Moritz Feldmann of NSIDE ATTACK LOGIC GmbH.