Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-5347: CWE-347 Improper Verification of Cryptographic Signature in Korenix JetNet Series

0
Critical
VulnerabilityCVE-2023-5347cvecve-2023-5347cwe-347cwe-327
Published: Tue Jan 09 2024 (01/09/2024, 09:54:59 UTC)
Source: CVE Database V5
Vendor/Project: Korenix
Product: JetNet Series

Description

An Improper Verification of Cryptographic Signature vulnerability in the update process of Korenix JetNet Series allows replacing the whole operating system including Trusted Executables. This issue affects JetNet devices older than firmware version 2024/01.

AI-Powered Analysis

AILast updated: 10/08/2025, 09:22:27 UTC

Technical Analysis

CVE-2023-5347 is a vulnerability classified under CWE-347 (Improper Verification of Cryptographic Signature) and CWE-327 (Use of a Broken or Risky Cryptographic Algorithm) affecting Korenix JetNet Series devices. The flaw resides in the update mechanism of these devices, where the cryptographic signature verification process is improperly implemented or bypassed. This weakness allows an attacker to supply a malicious firmware update that the device will accept as legitimate, enabling full replacement of the operating system and trusted executables. The compromised device can then be fully controlled by the attacker, leading to complete loss of confidentiality, integrity, and availability. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The affected versions include all firmware releases prior to 2024/01. While no public exploits have been reported yet, the critical CVSS score of 9.8 reflects the high risk posed by this vulnerability. The issue is particularly concerning for environments where JetNet devices are used in industrial control systems, critical infrastructure, or network edge devices, as attackers could leverage this to establish persistent footholds or disrupt operations.

Potential Impact

The impact of CVE-2023-5347 on European organizations is significant, especially for those operating critical infrastructure, manufacturing plants, or industrial control systems that utilize Korenix JetNet devices. Successful exploitation results in full device compromise, allowing attackers to execute arbitrary code, manipulate device functions, intercept or alter sensitive data, and disrupt network operations. This can lead to operational downtime, data breaches, and potential cascading effects on connected systems. Given the devices' role in network infrastructure, the vulnerability could facilitate lateral movement within networks, increasing the risk of broader attacks. The lack of authentication and user interaction requirements lowers the barrier for attackers, making it easier to exploit. European organizations in sectors such as energy, transportation, manufacturing, and utilities are particularly vulnerable, as these sectors often deploy such industrial networking equipment. The potential for espionage, sabotage, or ransomware deployment elevates the threat level in the European context.

Mitigation Recommendations

1. Immediate upgrade of all affected Korenix JetNet devices to firmware version 2024/01 or later, where the vulnerability is patched. 2. Implement strict network segmentation to isolate JetNet devices from untrusted networks and limit exposure to potential attackers. 3. Employ network monitoring and anomaly detection tools to identify unusual firmware update attempts or unauthorized device behavior. 4. Use secure management protocols and restrict administrative access to trusted personnel and networks only. 5. Maintain an inventory of all JetNet devices and verify firmware versions regularly to ensure compliance. 6. Coordinate with Korenix support or authorized vendors for guidance on secure update procedures and additional security controls. 7. Consider deploying intrusion prevention systems (IPS) that can detect and block attempts to exploit this vulnerability. 8. Educate operational technology (OT) and IT teams about the risks and signs of compromise related to this vulnerability to enhance incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CyberDanube
Date Reserved
2023-10-03T08:11:00.343Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0a31182aa0cae27f6ef9

Added to database: 6/3/2025, 2:44:01 PM

Last enriched: 10/8/2025, 9:22:27 AM

Last updated: 12/4/2025, 5:36:02 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats