CVE-2022-23768: CWE-284 Improper Access Control in Neo Information Systems Co., Ltd Home AP NIS-HAP11AC
This Vulnerability in NIS-HAP11AC is caused by an exposed external port for the telnet service. Remote attackers use this vulnerability to induce all attacks such as source code hijacking, remote control of the device.
AI Analysis
Technical Summary
CVE-2022-23768 is a high-severity vulnerability affecting the Neo Information Systems Co., Ltd Home AP NIS-HAP11AC device, specifically version V3.0-B20201117095902. The root cause of this vulnerability is an exposed external port running the Telnet service without proper access control, classified under CWE-284 (Improper Access Control). Telnet is an insecure protocol that transmits data, including credentials, in plaintext, making it highly susceptible to interception and unauthorized access. Because the Telnet port is exposed externally, remote attackers can connect directly to the device without authentication or user interaction. This allows attackers to perform a range of malicious activities, including hijacking the device's source code, gaining remote control, and potentially pivoting to other network resources. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the ease of exploitation and the critical functions of the affected device as a home access point. The lack of available patches further exacerbates the risk, leaving devices vulnerable until mitigations or updates are applied.
Potential Impact
For European organizations, this vulnerability poses a substantial threat, especially for small businesses and home office environments relying on the NIS-HAP11AC device for network connectivity. Successful exploitation could lead to complete compromise of the affected access point, enabling attackers to intercept sensitive communications, manipulate network traffic, or use the device as a foothold for further attacks within the corporate or home network. This could result in data breaches, disruption of internet services, and unauthorized access to internal systems. Given the device's role in providing network access, the availability impact could disrupt business operations. Confidentiality and integrity of data traversing the device are also at high risk. Additionally, compromised devices could be conscripted into botnets or used for launching attacks against other targets, amplifying the threat landscape for European networks.
Mitigation Recommendations
Immediate mitigation steps include disabling the Telnet service on the NIS-HAP11AC device if possible, or restricting access to the Telnet port via firewall rules to trusted internal IP addresses only. Network segmentation should be enforced to isolate the device from critical infrastructure. Organizations should monitor network traffic for unusual Telnet connections and implement intrusion detection systems to flag suspicious activity. Since no official patches are currently available, contacting the vendor for firmware updates or security advisories is crucial. Where feasible, replacing the vulnerable device with a more secure access point that does not expose Telnet externally is recommended. Additionally, enforcing strong network access controls, using VPNs for remote access, and employing secure management protocols such as SSH instead of Telnet will reduce exposure. Regular security audits and vulnerability assessments should be conducted to identify and remediate similar risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2022-23768: CWE-284 Improper Access Control in Neo Information Systems Co., Ltd Home AP NIS-HAP11AC
Description
This Vulnerability in NIS-HAP11AC is caused by an exposed external port for the telnet service. Remote attackers use this vulnerability to induce all attacks such as source code hijacking, remote control of the device.
AI-Powered Analysis
Technical Analysis
CVE-2022-23768 is a high-severity vulnerability affecting the Neo Information Systems Co., Ltd Home AP NIS-HAP11AC device, specifically version V3.0-B20201117095902. The root cause of this vulnerability is an exposed external port running the Telnet service without proper access control, classified under CWE-284 (Improper Access Control). Telnet is an insecure protocol that transmits data, including credentials, in plaintext, making it highly susceptible to interception and unauthorized access. Because the Telnet port is exposed externally, remote attackers can connect directly to the device without authentication or user interaction. This allows attackers to perform a range of malicious activities, including hijacking the device's source code, gaining remote control, and potentially pivoting to other network resources. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the ease of exploitation and the critical functions of the affected device as a home access point. The lack of available patches further exacerbates the risk, leaving devices vulnerable until mitigations or updates are applied.
Potential Impact
For European organizations, this vulnerability poses a substantial threat, especially for small businesses and home office environments relying on the NIS-HAP11AC device for network connectivity. Successful exploitation could lead to complete compromise of the affected access point, enabling attackers to intercept sensitive communications, manipulate network traffic, or use the device as a foothold for further attacks within the corporate or home network. This could result in data breaches, disruption of internet services, and unauthorized access to internal systems. Given the device's role in providing network access, the availability impact could disrupt business operations. Confidentiality and integrity of data traversing the device are also at high risk. Additionally, compromised devices could be conscripted into botnets or used for launching attacks against other targets, amplifying the threat landscape for European networks.
Mitigation Recommendations
Immediate mitigation steps include disabling the Telnet service on the NIS-HAP11AC device if possible, or restricting access to the Telnet port via firewall rules to trusted internal IP addresses only. Network segmentation should be enforced to isolate the device from critical infrastructure. Organizations should monitor network traffic for unusual Telnet connections and implement intrusion detection systems to flag suspicious activity. Since no official patches are currently available, contacting the vendor for firmware updates or security advisories is crucial. Where feasible, replacing the vulnerable device with a more secure access point that does not expose Telnet externally is recommended. Additionally, enforcing strong network access controls, using VPNs for remote access, and employing secure management protocols such as SSH instead of Telnet will reduce exposure. Regular security audits and vulnerability assessments should be conducted to identify and remediate similar risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- krcert
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f3ee7182aa0cae28796c0
Added to database: 6/3/2025, 6:28:55 PM
Last enriched: 7/4/2025, 12:43:07 PM
Last updated: 10/16/2025, 3:20:04 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10700: CWE-352 Cross-Site Request Forgery (CSRF) in elemntor Ally – Web Accessibility & Usability
MediumF5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion
HighCVE-2025-11683: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in TODDR YAML::Syck
UnknownCVE-2025-11619: CWE-295 Improper Certificate Validation in Devolutions Devolutions Server
HighCVE-2025-43313: An app may be able to access sensitive user data in Apple macOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.