First published: Tue Nov 29 2022(Updated: )
Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa UC-8580-T-LX | =1.1 | |
Moxa UC-8580-T-LX Firmware | ||
Moxa uc-8580-t-ct-lx | =1.1 | |
Moxa UC-8580-T-CT-Q-LX | ||
Moxa UC-8580-T-Q-LX | =1.1 | |
Moxa UC-8580-T-Q-LX Firmware | ||
Moxa UC-8580-T-CT-Q-LX | =1.1 | |
Moxa UC-8580-T-CT-Q-LX | ||
Moxa UC-8580-T-Q-LX Firmware | =1.1 | |
Moxa UC-8580-T-Q-LX Firmware | ||
Moxa UC-8580-LX Firmware | =1.1 | |
Moxa UC-8580-LX Firmware | ||
Moxa UC-8540-LX Firmware | >=1.0<=1.2 | |
Moxa uc-8540-lx | ||
Moxa UC-8540-T-CT-LX Firmware | >=1.0<=1.2 | |
Moxa uc-8540-t-ct-lx | ||
Moxa UC-8540-LX Firmware | >=1.0<=1.2 | |
Moxa UC-8540-T-LX | ||
Moxa UC-8410A-LX | =2.2 | |
Moxa UC-8410A-LX Firmware | ||
Moxa UC-8410A-NW-LX | =2.2 | |
Moxa UC-8410A-NW-LX Firmware | ||
Moxa UC-8410A-NW-T-LX | =2.2 | |
Moxa UC-8410A-NW-T-LX Firmware | ||
Moxa UC-8410A-T-LX Firmware | =2.2 | |
Moxa UC-8410A-T-LX Firmware | ||
Moxa Uc-8210-t-lx-s Firmware | >=1.0<=2.4 | |
Moxa Uc-8210-t-lx-s | ||
Moxa UC-8220-T-LX | >=1.0<=2.4 | |
Moxa UC-8220-T-LX | ||
Moxa UC-8220-T-LX-US-S | >=1.0<=2.4 | |
Moxa UC-8220-T-LX | ||
Moxa UC-8220-T-LX-EU-S Firmware | >=1.0<=2.4 | |
Moxa UC-8220-T-LX | ||
Moxa UC-8220-T-LX-AP-S | >=1.0<=2.4 | |
Moxa UC-8220-T-LX | ||
Moxa UC-8112A-ME-T-LX | =1.0 | |
Moxa UC-8112A-ME-T-LX | =1.1 | |
Moxa UC-8112A-ME-T-LX Firmware | ||
Moxa UC-8131-LX | =1.2 | |
Moxa UC-8131-LX | =1.3 | |
Moxa UC-8131-LX Firmware | ||
Moxa UC-8132-LX | =1.2 | |
Moxa UC-8132-LX | =1.3 | |
Moxa UC-8132-LX | ||
Moxa UC-8162-LX Firmware | =1.2 | |
Moxa UC-8162-LX Firmware | =1.3 | |
Moxa UC-8162-LX Firmware | ||
Moxa UC-8112-LX | =1.2 | |
Moxa UC-8112-LX | =1.3 | |
Moxa UC-8112-LX | ||
Moxa UC-5101-LX Firmware | =1.2 | |
Moxa UC-5101-LX Firmware | ||
Moxa UC-5101-T-LX | =1.2 | |
Moxa UC-5101-T-LX Firmware | ||
Moxa UC-5102-LX | =1.2 | |
Moxa UC-5102-LX Firmware | ||
Moxa UC-5102-T-LX | =1.2 | |
Moxa UC-5102-T-LX Firmware | ||
Moxa UC-5111-LX | =1.2 | |
Moxa UC-5111-LX | ||
Moxa uc-5111-t-lx | =1.2 | |
Moxa UC-5111-T-LX Firmware | ||
Moxa UC-5112-LX | =1.2 | |
Moxa UC-5112-LX Firmware | ||
Moxa UC-5112-T-LX | =1.2 | |
Moxa UC-5112-T-LX Firmware | ||
Moxa UC-3101-T-AP-LX | >=1.2<=2.0 | |
Moxa UC-3101-T-AP-LX | ||
Moxa UC-3101-T-EU-LX Firmware | >=1.2<=2.0 | |
Moxa UC-3101-T-EU-LX Firmware | ||
Moxa UC-3101-T-US-LX | >=1.2<=2.0 | |
Moxa UC-3101-T-US-LX Firmware | ||
Moxa UC-3111-T-AP-LX | >=1.2<=2.0 | |
Moxa UC-3111-T-AP-LX Firmware | ||
Moxa UC-3111-T-AP-LX-NW | >=1.2<=2.0 | |
Moxa UC-3111-T-AP-LX-NW Firmware | ||
Moxa UC-3111-T-EU-LX | >=1.2<=2.0 | |
Moxa UC-3111-T-EU-LX Firmware | ||
Moxa UC-3111-T-EU-LX-NW Firmware | >=1.2<=2.0 | |
Moxa UC-3111-T-EU-LX-NW Firmware | ||
Moxa UC-3111-T-US-LX Firmware | >=1.2<=2.0 | |
Moxa UC-3111-T-US-LX Firmware | ||
Moxa UC-3111-T-US-LX-NW | >=1.2<=2.0 | |
Moxa UC-3111-T-US-LX-NW Firmware | ||
Moxa UC-3121-T-AP-LX | >=1.2<=2.0 | |
Moxa UC-3121-T-AP-LX | ||
Moxa uc-3121-t-eu-lx firmware | >=1.2<=2.0 | |
Moxa UC-3121-T-EU-LX | ||
Moxa UC-3121-T-US-LX Firmware | >=1.2<=2.0 | |
Moxa UC-3121-T-US-LX Firmware | ||
Moxa UC-2101-LX | >=1.3<=1.5 | |
Moxa UC-2101-LX Firmware | ||
Moxa UC-2102-LX | >=1.3<=1.5 | |
Moxa UC-2102-LX | ||
Moxa UC-2104-LX | >=1.3<=1.5 | |
Moxa UC-2104-LX | ||
Moxa UC-2111-LX Firmware | >=1.3<=1.5 | |
Moxa UC-2111-LX Firmware | ||
Moxa UC-2112-LX | >=1.3<=1.5 | |
Moxa UC-2112-LX Firmware | ||
Moxa UC-2114-T-LX | >=1.3<=1.5 | |
Moxa UC-2114-T-LX Firmware | ||
Moxa UC-2116-T-LX | >=1.3<=1.5 | |
Moxa UC-2116-T-LX Firmware | ||
Cradlepoint IBR600 |
Cradlepoint recommends users to update to at least version: * NCOS v7.22.70 NCOS release 7.1.0 and greater are no longer available for manual or offline download and are performed via the NetCloud Manager, which requires a subscription. For more information and NCOS upgrade best practices visit Cradlepoint Netcloud Service https://cradlepoint.com/products/netcloud-service/ . For more information about the latest update, see the Cradlepoint Release Notes https://d2c9o94y5j661e.cloudfront.net/FW-ReleaseNotesNCOS7.22.70-050722.pdf .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3086 is classified as a critical vulnerability that allows local attackers to gain full shell access.
To fix CVE-2022-3086, upgrade to the latest version of Cradlepoint IBR600 NCOS beyond version 6.5.0.160bc2e.
CVE-2022-3086 affects Cradlepoint IBR600 NetCloud OS (NCOS) versions 6.5.0.160bc2e and earlier.
An attacker exploiting CVE-2022-3086 can execute arbitrary code by gaining unrestricted shell access.
The impact of CVE-2022-3086 includes potential loss of confidentiality, integrity, and system availability due to unauthorized access.