CVE-2022-23768: CWE-284 Improper Access Control in Neo Information Systems Co., Ltd Home AP NIS-HAP11AC
This Vulnerability in NIS-HAP11AC is caused by an exposed external port for the telnet service. Remote attackers use this vulnerability to induce all attacks such as source code hijacking, remote control of the device.
AI Analysis
Technical Summary
CVE-2022-23768 is a high-severity vulnerability affecting the Neo Information Systems Co., Ltd Home AP NIS-HAP11AC device, specifically version V3.0-B20201117095902. The root cause of this vulnerability is an exposed external port running the Telnet service without proper access control, classified under CWE-284 (Improper Access Control). Telnet is an insecure protocol that transmits data, including credentials, in plaintext, making it highly susceptible to interception and unauthorized access. Because the Telnet port is exposed externally, remote attackers can connect directly to the device without authentication or user interaction. This allows attackers to perform a range of malicious activities, including hijacking the device's source code, gaining remote control, and potentially pivoting to other network resources. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the ease of exploitation and the critical functions of the affected device as a home access point. The lack of available patches further exacerbates the risk, leaving devices vulnerable until mitigations or updates are applied.
Potential Impact
For European organizations, this vulnerability poses a substantial threat, especially for small businesses and home office environments relying on the NIS-HAP11AC device for network connectivity. Successful exploitation could lead to complete compromise of the affected access point, enabling attackers to intercept sensitive communications, manipulate network traffic, or use the device as a foothold for further attacks within the corporate or home network. This could result in data breaches, disruption of internet services, and unauthorized access to internal systems. Given the device's role in providing network access, the availability impact could disrupt business operations. Confidentiality and integrity of data traversing the device are also at high risk. Additionally, compromised devices could be conscripted into botnets or used for launching attacks against other targets, amplifying the threat landscape for European networks.
Mitigation Recommendations
Immediate mitigation steps include disabling the Telnet service on the NIS-HAP11AC device if possible, or restricting access to the Telnet port via firewall rules to trusted internal IP addresses only. Network segmentation should be enforced to isolate the device from critical infrastructure. Organizations should monitor network traffic for unusual Telnet connections and implement intrusion detection systems to flag suspicious activity. Since no official patches are currently available, contacting the vendor for firmware updates or security advisories is crucial. Where feasible, replacing the vulnerable device with a more secure access point that does not expose Telnet externally is recommended. Additionally, enforcing strong network access controls, using VPNs for remote access, and employing secure management protocols such as SSH instead of Telnet will reduce exposure. Regular security audits and vulnerability assessments should be conducted to identify and remediate similar risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2022-23768: CWE-284 Improper Access Control in Neo Information Systems Co., Ltd Home AP NIS-HAP11AC
Description
This Vulnerability in NIS-HAP11AC is caused by an exposed external port for the telnet service. Remote attackers use this vulnerability to induce all attacks such as source code hijacking, remote control of the device.
AI-Powered Analysis
Technical Analysis
CVE-2022-23768 is a high-severity vulnerability affecting the Neo Information Systems Co., Ltd Home AP NIS-HAP11AC device, specifically version V3.0-B20201117095902. The root cause of this vulnerability is an exposed external port running the Telnet service without proper access control, classified under CWE-284 (Improper Access Control). Telnet is an insecure protocol that transmits data, including credentials, in plaintext, making it highly susceptible to interception and unauthorized access. Because the Telnet port is exposed externally, remote attackers can connect directly to the device without authentication or user interaction. This allows attackers to perform a range of malicious activities, including hijacking the device's source code, gaining remote control, and potentially pivoting to other network resources. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the ease of exploitation and the critical functions of the affected device as a home access point. The lack of available patches further exacerbates the risk, leaving devices vulnerable until mitigations or updates are applied.
Potential Impact
For European organizations, this vulnerability poses a substantial threat, especially for small businesses and home office environments relying on the NIS-HAP11AC device for network connectivity. Successful exploitation could lead to complete compromise of the affected access point, enabling attackers to intercept sensitive communications, manipulate network traffic, or use the device as a foothold for further attacks within the corporate or home network. This could result in data breaches, disruption of internet services, and unauthorized access to internal systems. Given the device's role in providing network access, the availability impact could disrupt business operations. Confidentiality and integrity of data traversing the device are also at high risk. Additionally, compromised devices could be conscripted into botnets or used for launching attacks against other targets, amplifying the threat landscape for European networks.
Mitigation Recommendations
Immediate mitigation steps include disabling the Telnet service on the NIS-HAP11AC device if possible, or restricting access to the Telnet port via firewall rules to trusted internal IP addresses only. Network segmentation should be enforced to isolate the device from critical infrastructure. Organizations should monitor network traffic for unusual Telnet connections and implement intrusion detection systems to flag suspicious activity. Since no official patches are currently available, contacting the vendor for firmware updates or security advisories is crucial. Where feasible, replacing the vulnerable device with a more secure access point that does not expose Telnet externally is recommended. Additionally, enforcing strong network access controls, using VPNs for remote access, and employing secure management protocols such as SSH instead of Telnet will reduce exposure. Regular security audits and vulnerability assessments should be conducted to identify and remediate similar risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- krcert
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f3ee7182aa0cae28796c0
Added to database: 6/3/2025, 6:28:55 PM
Last enriched: 7/4/2025, 12:43:07 PM
Last updated: 8/17/2025, 1:57:22 PM
Views: 9
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.