Skip to main content

CVE-2022-23768: CWE-284 Improper Access Control in Neo Information Systems Co., Ltd Home AP NIS-HAP11AC

High
VulnerabilityCVE-2022-23768cvecve-2022-23768cwe-284
Published: Mon Sep 19 2022 (09/19/2022, 19:48:57 UTC)
Source: CVE Database V5
Vendor/Project: Neo Information Systems Co., Ltd
Product: Home AP NIS-HAP11AC

Description

This Vulnerability in NIS-HAP11AC is caused by an exposed external port for the telnet service. Remote attackers use this vulnerability to induce all attacks such as source code hijacking, remote control of the device.

AI-Powered Analysis

AILast updated: 07/04/2025, 12:43:07 UTC

Technical Analysis

CVE-2022-23768 is a high-severity vulnerability affecting the Neo Information Systems Co., Ltd Home AP NIS-HAP11AC device, specifically version V3.0-B20201117095902. The root cause of this vulnerability is an exposed external port running the Telnet service without proper access control, classified under CWE-284 (Improper Access Control). Telnet is an insecure protocol that transmits data, including credentials, in plaintext, making it highly susceptible to interception and unauthorized access. Because the Telnet port is exposed externally, remote attackers can connect directly to the device without authentication or user interaction. This allows attackers to perform a range of malicious activities, including hijacking the device's source code, gaining remote control, and potentially pivoting to other network resources. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the ease of exploitation and the critical functions of the affected device as a home access point. The lack of available patches further exacerbates the risk, leaving devices vulnerable until mitigations or updates are applied.

Potential Impact

For European organizations, this vulnerability poses a substantial threat, especially for small businesses and home office environments relying on the NIS-HAP11AC device for network connectivity. Successful exploitation could lead to complete compromise of the affected access point, enabling attackers to intercept sensitive communications, manipulate network traffic, or use the device as a foothold for further attacks within the corporate or home network. This could result in data breaches, disruption of internet services, and unauthorized access to internal systems. Given the device's role in providing network access, the availability impact could disrupt business operations. Confidentiality and integrity of data traversing the device are also at high risk. Additionally, compromised devices could be conscripted into botnets or used for launching attacks against other targets, amplifying the threat landscape for European networks.

Mitigation Recommendations

Immediate mitigation steps include disabling the Telnet service on the NIS-HAP11AC device if possible, or restricting access to the Telnet port via firewall rules to trusted internal IP addresses only. Network segmentation should be enforced to isolate the device from critical infrastructure. Organizations should monitor network traffic for unusual Telnet connections and implement intrusion detection systems to flag suspicious activity. Since no official patches are currently available, contacting the vendor for firmware updates or security advisories is crucial. Where feasible, replacing the vulnerable device with a more secure access point that does not expose Telnet externally is recommended. Additionally, enforcing strong network access controls, using VPNs for remote access, and employing secure management protocols such as SSH instead of Telnet will reduce exposure. Regular security audits and vulnerability assessments should be conducted to identify and remediate similar risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
krcert
Date Reserved
2022-01-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f3ee7182aa0cae28796c0

Added to database: 6/3/2025, 6:28:55 PM

Last enriched: 7/4/2025, 12:43:07 PM

Last updated: 8/17/2025, 1:57:22 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats