Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-5376: CWE-306 Missing Authentication for Critical Function in Korenix JetNet Series

0
High
VulnerabilityCVE-2023-5376cvecve-2023-5376cwe-306
Published: Tue Jan 09 2024 (01/09/2024, 09:44:18 UTC)
Source: CVE Database V5
Vendor/Project: Korenix
Product: JetNet Series

Description

An Improper Authentication vulnerability in Korenix JetNet TFTP allows abuse of this service. This issue affects JetNet devices older than firmware version 2024/01.

AI-Powered Analysis

AILast updated: 10/08/2025, 09:49:30 UTC

Technical Analysis

CVE-2023-5376 is an Improper Authentication vulnerability (CWE-306) identified in the TFTP service of Korenix JetNet Series devices. These devices, widely used in industrial networking and automation, run firmware versions prior to 2024/01 that do not enforce authentication for critical TFTP functions. This lack of authentication allows remote attackers to abuse the TFTP service without any privileges or user interaction, potentially modifying device configurations or firmware images. The vulnerability has a CVSS v3.1 base score of 8.6, reflecting its high severity due to network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change. While confidentiality is not impacted, the integrity of device operations can be compromised, which may lead to operational disruptions or facilitate further attacks within industrial control systems or network infrastructure. No public exploits are currently known, but the vulnerability's characteristics make it a prime target for attackers aiming to disrupt or manipulate critical infrastructure components. The issue affects all JetNet devices running firmware older than 2024/01, emphasizing the need for timely firmware updates. The vulnerability was reserved in October 2023 and published in January 2024 by CyberDanube.

Potential Impact

For European organizations, especially those operating in industrial automation, manufacturing, transportation, and critical infrastructure sectors, this vulnerability poses a significant risk. Exploitation can lead to unauthorized modification of device firmware or configurations, potentially causing operational disruptions, safety hazards, or enabling lateral movement within networks. Given the widespread use of Korenix JetNet devices in industrial Ethernet applications, compromised devices could affect production lines, traffic control systems, or energy distribution networks. The integrity breach could result in downtime, financial losses, regulatory non-compliance, and reputational damage. Since the vulnerability can be exploited remotely without authentication, attackers can target exposed devices over the internet or less-secure internal networks. The absence of known exploits currently provides a window for mitigation, but the high severity score indicates that the threat could escalate rapidly if exploited in the wild.

Mitigation Recommendations

1. Immediately inventory all Korenix JetNet devices in your environment and identify firmware versions. 2. Apply firmware updates to version 2024/01 or later as soon as they become available from Korenix. 3. Until patches are deployed, restrict network access to the TFTP service by implementing network segmentation and firewall rules that limit TFTP traffic to trusted management stations only. 4. Monitor network traffic for unusual TFTP activity, which may indicate exploitation attempts. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting unauthorized TFTP usage. 6. Review device configurations and logs regularly to detect unauthorized changes. 7. Engage with Korenix support or vendor advisories for any interim mitigations or updates. 8. Incorporate this vulnerability into risk assessments and incident response plans focused on industrial control systems. 9. Educate operational technology (OT) and IT teams about the risks and signs of exploitation related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CyberDanube
Date Reserved
2023-10-04T09:30:19.108Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e6339d143ec9919d6f280d

Added to database: 10/8/2025, 9:49:17 AM

Last enriched: 10/8/2025, 9:49:30 AM

Last updated: 10/8/2025, 1:50:46 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats