Skip to main content

CVE-2022-3203: CWE-912 Hidden Functionality in ORing IAP-420(+)

Critical
VulnerabilityCVE-2022-3203cvecve-2022-3203cwe-912
Published: Fri Oct 21 2022 (10/21/2022, 12:30:12 UTC)
Source: CVE
Vendor/Project: ORing
Product: IAP-420(+)

Description

On ORing net IAP-420(+) with FW version 2.0m a telnet server is enabled by default and cannot permanently be disabled. You can connect to the device via LAN or WiFi with hardcoded credentials and get an administrative shell. These credentials are reset to defaults with every reboot.

AI-Powered Analysis

AILast updated: 07/05/2025, 13:56:46 UTC

Technical Analysis

CVE-2022-3203 is a critical vulnerability affecting the ORing IAP-420(+) industrial access point running firmware version 2.0m. The vulnerability arises from a hidden functionality where a Telnet server is enabled by default and cannot be permanently disabled. This Telnet server accepts connections over both LAN and WiFi interfaces. The device uses hardcoded credentials for administrative access, which are reset to default values upon every reboot. This means that an attacker with network access can connect to the device without any prior authentication or user interaction, gaining an administrative shell with full control over the device. The vulnerability is classified under CWE-912 (Hidden Functionality), indicating that the Telnet service is an undocumented or unintended feature that introduces a significant security risk. The CVSS v3.1 base score is 9.8 (critical), reflecting the ease of exploitation (network accessible, no privileges or user interaction required) and the severe impact on confidentiality, integrity, and availability. An attacker can fully compromise the device, potentially pivoting into the industrial network or disrupting critical infrastructure. No patches or mitigations have been officially released by the vendor as of the published date. The vulnerability was reserved on 2022-09-13 and published on 2022-10-21. Although no known exploits are reported in the wild, the simplicity of exploitation and the critical nature of the flaw make it a high-risk issue for organizations using this device in operational technology (OT) environments.

Potential Impact

For European organizations, especially those in critical infrastructure sectors such as manufacturing, energy, transportation, and utilities, this vulnerability poses a significant risk. The ORing IAP-420(+) is an industrial access point commonly used to provide network connectivity in harsh or remote environments. Compromise of these devices can lead to unauthorized access to sensitive industrial control systems (ICS) and supervisory control and data acquisition (SCADA) networks. Attackers could manipulate device configurations, disrupt network communications, or use the device as a foothold for lateral movement within the OT network. This could result in operational downtime, safety hazards, data breaches, and potential physical damage to industrial equipment. Given the default Telnet service cannot be disabled and uses hardcoded credentials, even less sophisticated attackers or automated scanning tools can exploit this vulnerability. The impact extends beyond the device itself to the broader network and operational processes it supports, increasing the risk of widespread disruption in European industrial environments.

Mitigation Recommendations

Since no official patch is available, European organizations should implement immediate compensating controls. First, isolate the affected ORing IAP-420(+) devices from untrusted networks, restricting access to trusted management networks only. Use network segmentation and firewall rules to block Telnet (port 23) traffic from unauthorized sources. Disable or restrict WiFi access if possible, or change WiFi credentials to limit exposure. Monitor network traffic for unusual Telnet connection attempts and implement intrusion detection/prevention systems (IDS/IPS) to alert on or block suspicious activity. Consider replacing the affected devices with updated models or alternative products that do not have this vulnerability. If device replacement is not feasible, physically secure the devices to prevent unauthorized local access. Additionally, maintain strict inventory and asset management to identify all affected devices and track remediation progress. Regularly audit device configurations and network access policies to ensure no unauthorized changes occur. Finally, engage with the vendor for updates or firmware patches and subscribe to vulnerability advisories for timely information.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2022-09-13T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd98e5

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 1:56:46 PM

Last updated: 8/17/2025, 3:46:51 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats