CVE-2022-3203: CWE-912 Hidden Functionality in ORing IAP-420(+)
On ORing net IAP-420(+) with FW version 2.0m a telnet server is enabled by default and cannot permanently be disabled. You can connect to the device via LAN or WiFi with hardcoded credentials and get an administrative shell. These credentials are reset to defaults with every reboot.
AI Analysis
Technical Summary
CVE-2022-3203 is a critical vulnerability affecting the ORing IAP-420(+) industrial access point running firmware version 2.0m. The vulnerability arises from a hidden functionality where a Telnet server is enabled by default and cannot be permanently disabled. This Telnet server accepts connections over both LAN and WiFi interfaces. The device uses hardcoded credentials for administrative access, which are reset to default values upon every reboot. This means that an attacker with network access can connect to the device without any prior authentication or user interaction, gaining an administrative shell with full control over the device. The vulnerability is classified under CWE-912 (Hidden Functionality), indicating that the Telnet service is an undocumented or unintended feature that introduces a significant security risk. The CVSS v3.1 base score is 9.8 (critical), reflecting the ease of exploitation (network accessible, no privileges or user interaction required) and the severe impact on confidentiality, integrity, and availability. An attacker can fully compromise the device, potentially pivoting into the industrial network or disrupting critical infrastructure. No patches or mitigations have been officially released by the vendor as of the published date. The vulnerability was reserved on 2022-09-13 and published on 2022-10-21. Although no known exploits are reported in the wild, the simplicity of exploitation and the critical nature of the flaw make it a high-risk issue for organizations using this device in operational technology (OT) environments.
Potential Impact
For European organizations, especially those in critical infrastructure sectors such as manufacturing, energy, transportation, and utilities, this vulnerability poses a significant risk. The ORing IAP-420(+) is an industrial access point commonly used to provide network connectivity in harsh or remote environments. Compromise of these devices can lead to unauthorized access to sensitive industrial control systems (ICS) and supervisory control and data acquisition (SCADA) networks. Attackers could manipulate device configurations, disrupt network communications, or use the device as a foothold for lateral movement within the OT network. This could result in operational downtime, safety hazards, data breaches, and potential physical damage to industrial equipment. Given the default Telnet service cannot be disabled and uses hardcoded credentials, even less sophisticated attackers or automated scanning tools can exploit this vulnerability. The impact extends beyond the device itself to the broader network and operational processes it supports, increasing the risk of widespread disruption in European industrial environments.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. First, isolate the affected ORing IAP-420(+) devices from untrusted networks, restricting access to trusted management networks only. Use network segmentation and firewall rules to block Telnet (port 23) traffic from unauthorized sources. Disable or restrict WiFi access if possible, or change WiFi credentials to limit exposure. Monitor network traffic for unusual Telnet connection attempts and implement intrusion detection/prevention systems (IDS/IPS) to alert on or block suspicious activity. Consider replacing the affected devices with updated models or alternative products that do not have this vulnerability. If device replacement is not feasible, physically secure the devices to prevent unauthorized local access. Additionally, maintain strict inventory and asset management to identify all affected devices and track remediation progress. Regularly audit device configurations and network access policies to ensure no unauthorized changes occur. Finally, engage with the vendor for updates or firmware patches and subscribe to vulnerability advisories for timely information.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Spain, Sweden, Finland
CVE-2022-3203: CWE-912 Hidden Functionality in ORing IAP-420(+)
Description
On ORing net IAP-420(+) with FW version 2.0m a telnet server is enabled by default and cannot permanently be disabled. You can connect to the device via LAN or WiFi with hardcoded credentials and get an administrative shell. These credentials are reset to defaults with every reboot.
AI-Powered Analysis
Technical Analysis
CVE-2022-3203 is a critical vulnerability affecting the ORing IAP-420(+) industrial access point running firmware version 2.0m. The vulnerability arises from a hidden functionality where a Telnet server is enabled by default and cannot be permanently disabled. This Telnet server accepts connections over both LAN and WiFi interfaces. The device uses hardcoded credentials for administrative access, which are reset to default values upon every reboot. This means that an attacker with network access can connect to the device without any prior authentication or user interaction, gaining an administrative shell with full control over the device. The vulnerability is classified under CWE-912 (Hidden Functionality), indicating that the Telnet service is an undocumented or unintended feature that introduces a significant security risk. The CVSS v3.1 base score is 9.8 (critical), reflecting the ease of exploitation (network accessible, no privileges or user interaction required) and the severe impact on confidentiality, integrity, and availability. An attacker can fully compromise the device, potentially pivoting into the industrial network or disrupting critical infrastructure. No patches or mitigations have been officially released by the vendor as of the published date. The vulnerability was reserved on 2022-09-13 and published on 2022-10-21. Although no known exploits are reported in the wild, the simplicity of exploitation and the critical nature of the flaw make it a high-risk issue for organizations using this device in operational technology (OT) environments.
Potential Impact
For European organizations, especially those in critical infrastructure sectors such as manufacturing, energy, transportation, and utilities, this vulnerability poses a significant risk. The ORing IAP-420(+) is an industrial access point commonly used to provide network connectivity in harsh or remote environments. Compromise of these devices can lead to unauthorized access to sensitive industrial control systems (ICS) and supervisory control and data acquisition (SCADA) networks. Attackers could manipulate device configurations, disrupt network communications, or use the device as a foothold for lateral movement within the OT network. This could result in operational downtime, safety hazards, data breaches, and potential physical damage to industrial equipment. Given the default Telnet service cannot be disabled and uses hardcoded credentials, even less sophisticated attackers or automated scanning tools can exploit this vulnerability. The impact extends beyond the device itself to the broader network and operational processes it supports, increasing the risk of widespread disruption in European industrial environments.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. First, isolate the affected ORing IAP-420(+) devices from untrusted networks, restricting access to trusted management networks only. Use network segmentation and firewall rules to block Telnet (port 23) traffic from unauthorized sources. Disable or restrict WiFi access if possible, or change WiFi credentials to limit exposure. Monitor network traffic for unusual Telnet connection attempts and implement intrusion detection/prevention systems (IDS/IPS) to alert on or block suspicious activity. Consider replacing the affected devices with updated models or alternative products that do not have this vulnerability. If device replacement is not feasible, physically secure the devices to prevent unauthorized local access. Additionally, maintain strict inventory and asset management to identify all affected devices and track remediation progress. Regularly audit device configurations and network access policies to ensure no unauthorized changes occur. Finally, engage with the vendor for updates or firmware patches and subscribe to vulnerability advisories for timely information.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2022-09-13T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd98e5
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 1:56:46 PM
Last updated: 8/17/2025, 3:46:51 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.