Skip to main content

CVE-2020-23592: n/a in n/a

High
VulnerabilityCVE-2020-23592cvecve-2020-23592
Published: Wed Nov 23 2022 (11/23/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A vulnerability in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to Reset ONU to Factory Default through ' /mgm_dev_reset.asp.' Resetting to default leads to Escalation of Privileges by logging-in with default credentials.

AI-Powered Analysis

AILast updated: 06/22/2025, 12:38:04 UTC

Technical Analysis

CVE-2020-23592 is a high-severity vulnerability affecting the OPTILINK OP-XT71000N device, specifically hardware version V2.2 running firmware version OP_V3.3.1-191028. The vulnerability is a Cross-Site Request Forgery (CSRF) flaw that allows an unauthenticated remote attacker to trigger a factory reset of the Optical Network Unit (ONU) by sending a crafted request to the endpoint '/mgm_dev_reset.asp'. This reset action restores the device to its default factory settings, which includes default administrative credentials. Consequently, the attacker can escalate privileges by logging into the device with these default credentials, gaining full control over the ONU. The CVSS v3.1 score is 8.8 (high), reflecting the vulnerability's ease of exploitation (no privileges required, network attack vector), and its severe impact on confidentiality, integrity, and availability. The vulnerability falls under CWE-352 (Cross-Site Request Forgery), indicating that the device lacks proper anti-CSRF protections on critical management functions. No patches or vendor mitigations are currently listed, and no known exploits have been reported in the wild. The attack requires user interaction only in the sense that the victim must visit a malicious web page or be tricked into sending the crafted request, but no authentication is needed to trigger the reset. This vulnerability is particularly dangerous because it allows attackers to gain persistent administrative access by resetting the device and using default credentials, potentially compromising the network infrastructure relying on the ONU for connectivity.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for Internet Service Providers (ISPs), telecommunications companies, and enterprises using OPTILINK OP-XT71000N ONUs in their network infrastructure. A successful attack can lead to denial of service by resetting network devices, disrupting connectivity for end-users or critical services. Furthermore, attackers gaining administrative access can manipulate device configurations, intercept or redirect traffic, and potentially pivot to other internal network assets, compromising confidentiality and integrity. Given the device’s role in fiber optic broadband access, exploitation could impact residential customers, business clients, and critical infrastructure sectors relying on stable and secure network connectivity. The escalation of privileges without authentication increases the attack surface, enabling widespread exploitation if attackers target multiple devices. The lack of patches and the high CVSS score underscore the urgency for affected organizations to address this vulnerability promptly to avoid service outages and data breaches.

Mitigation Recommendations

1. Network Segmentation: Isolate OPTILINK ONUs from direct exposure to untrusted networks or the internet. Place management interfaces behind firewalls or VPNs to restrict access. 2. Disable Remote Management: If remote management is not essential, disable it to prevent external access to the device’s web interface. 3. Implement Web Filtering: Block access to malicious or untrusted websites that could host CSRF attack vectors, reducing the risk of user interaction leading to exploitation. 4. Change Default Credentials Immediately: After deployment, change default passwords to strong, unique credentials to prevent unauthorized access post-reset. 5. Monitor Device Logs and Network Traffic: Set up alerts for unexpected resets or login attempts using default credentials to detect potential exploitation attempts early. 6. Vendor Engagement: Contact OPTILINK or device suppliers to inquire about firmware updates or patches addressing this vulnerability and apply them as soon as available. 7. User Awareness: Educate users and administrators about the risks of CSRF attacks and the importance of cautious browsing behavior, especially on networks with vulnerable devices. 8. Implement CSRF Protections: Where possible, configure or request vendor support to add anti-CSRF tokens or other protections on critical device management pages to prevent unauthorized requests.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2020-08-13T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbeeab0

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/22/2025, 12:38:04 PM

Last updated: 8/15/2025, 11:38:33 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats