CVE-2022-3203: CWE-912 Hidden Functionality in ORing IAP-420(+)
On ORing net IAP-420(+) with FW version 2.0m a telnet server is enabled by default and cannot permanently be disabled. You can connect to the device via LAN or WiFi with hardcoded credentials and get an administrative shell. These credentials are reset to defaults with every reboot.
AI Analysis
Technical Summary
CVE-2022-3203 is a critical vulnerability affecting the ORing IAP-420(+) industrial access point running firmware version 2.0m. The vulnerability arises from a hidden functionality where a Telnet server is enabled by default and cannot be permanently disabled. This Telnet server accepts connections over both LAN and WiFi interfaces. The device uses hardcoded credentials for administrative access, which are reset to default values upon every reboot. This means that an attacker with network access can connect to the device without any prior authentication or user interaction, gaining an administrative shell with full control over the device. The vulnerability is classified under CWE-912 (Hidden Functionality), indicating that the Telnet service is an undocumented or unintended feature that introduces a significant security risk. The CVSS v3.1 base score is 9.8 (critical), reflecting the ease of exploitation (network accessible, no privileges or user interaction required) and the severe impact on confidentiality, integrity, and availability. An attacker can fully compromise the device, potentially pivoting into the industrial network or disrupting critical infrastructure. No patches or mitigations have been officially released by the vendor as of the published date. The vulnerability was reserved on 2022-09-13 and published on 2022-10-21. Although no known exploits are reported in the wild, the simplicity of exploitation and the critical nature of the flaw make it a high-risk issue for organizations using this device in operational technology (OT) environments.
Potential Impact
For European organizations, especially those in critical infrastructure sectors such as manufacturing, energy, transportation, and utilities, this vulnerability poses a significant risk. The ORing IAP-420(+) is an industrial access point commonly used to provide network connectivity in harsh or remote environments. Compromise of these devices can lead to unauthorized access to sensitive industrial control systems (ICS) and supervisory control and data acquisition (SCADA) networks. Attackers could manipulate device configurations, disrupt network communications, or use the device as a foothold for lateral movement within the OT network. This could result in operational downtime, safety hazards, data breaches, and potential physical damage to industrial equipment. Given the default Telnet service cannot be disabled and uses hardcoded credentials, even less sophisticated attackers or automated scanning tools can exploit this vulnerability. The impact extends beyond the device itself to the broader network and operational processes it supports, increasing the risk of widespread disruption in European industrial environments.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. First, isolate the affected ORing IAP-420(+) devices from untrusted networks, restricting access to trusted management networks only. Use network segmentation and firewall rules to block Telnet (port 23) traffic from unauthorized sources. Disable or restrict WiFi access if possible, or change WiFi credentials to limit exposure. Monitor network traffic for unusual Telnet connection attempts and implement intrusion detection/prevention systems (IDS/IPS) to alert on or block suspicious activity. Consider replacing the affected devices with updated models or alternative products that do not have this vulnerability. If device replacement is not feasible, physically secure the devices to prevent unauthorized local access. Additionally, maintain strict inventory and asset management to identify all affected devices and track remediation progress. Regularly audit device configurations and network access policies to ensure no unauthorized changes occur. Finally, engage with the vendor for updates or firmware patches and subscribe to vulnerability advisories for timely information.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Spain, Sweden, Finland
CVE-2022-3203: CWE-912 Hidden Functionality in ORing IAP-420(+)
Description
On ORing net IAP-420(+) with FW version 2.0m a telnet server is enabled by default and cannot permanently be disabled. You can connect to the device via LAN or WiFi with hardcoded credentials and get an administrative shell. These credentials are reset to defaults with every reboot.
AI-Powered Analysis
Technical Analysis
CVE-2022-3203 is a critical vulnerability affecting the ORing IAP-420(+) industrial access point running firmware version 2.0m. The vulnerability arises from a hidden functionality where a Telnet server is enabled by default and cannot be permanently disabled. This Telnet server accepts connections over both LAN and WiFi interfaces. The device uses hardcoded credentials for administrative access, which are reset to default values upon every reboot. This means that an attacker with network access can connect to the device without any prior authentication or user interaction, gaining an administrative shell with full control over the device. The vulnerability is classified under CWE-912 (Hidden Functionality), indicating that the Telnet service is an undocumented or unintended feature that introduces a significant security risk. The CVSS v3.1 base score is 9.8 (critical), reflecting the ease of exploitation (network accessible, no privileges or user interaction required) and the severe impact on confidentiality, integrity, and availability. An attacker can fully compromise the device, potentially pivoting into the industrial network or disrupting critical infrastructure. No patches or mitigations have been officially released by the vendor as of the published date. The vulnerability was reserved on 2022-09-13 and published on 2022-10-21. Although no known exploits are reported in the wild, the simplicity of exploitation and the critical nature of the flaw make it a high-risk issue for organizations using this device in operational technology (OT) environments.
Potential Impact
For European organizations, especially those in critical infrastructure sectors such as manufacturing, energy, transportation, and utilities, this vulnerability poses a significant risk. The ORing IAP-420(+) is an industrial access point commonly used to provide network connectivity in harsh or remote environments. Compromise of these devices can lead to unauthorized access to sensitive industrial control systems (ICS) and supervisory control and data acquisition (SCADA) networks. Attackers could manipulate device configurations, disrupt network communications, or use the device as a foothold for lateral movement within the OT network. This could result in operational downtime, safety hazards, data breaches, and potential physical damage to industrial equipment. Given the default Telnet service cannot be disabled and uses hardcoded credentials, even less sophisticated attackers or automated scanning tools can exploit this vulnerability. The impact extends beyond the device itself to the broader network and operational processes it supports, increasing the risk of widespread disruption in European industrial environments.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. First, isolate the affected ORing IAP-420(+) devices from untrusted networks, restricting access to trusted management networks only. Use network segmentation and firewall rules to block Telnet (port 23) traffic from unauthorized sources. Disable or restrict WiFi access if possible, or change WiFi credentials to limit exposure. Monitor network traffic for unusual Telnet connection attempts and implement intrusion detection/prevention systems (IDS/IPS) to alert on or block suspicious activity. Consider replacing the affected devices with updated models or alternative products that do not have this vulnerability. If device replacement is not feasible, physically secure the devices to prevent unauthorized local access. Additionally, maintain strict inventory and asset management to identify all affected devices and track remediation progress. Regularly audit device configurations and network access policies to ensure no unauthorized changes occur. Finally, engage with the vendor for updates or firmware patches and subscribe to vulnerability advisories for timely information.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2022-09-13T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd98e5
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 1:56:46 PM
Last updated: 10/16/2025, 12:49:38 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.