Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48442: n/a

0
Medium
VulnerabilityCVE-2024-48442cvecve-2024-48442
Published: Thu Oct 24 2024 (10/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-48442 is a medium-severity vulnerability in Shenzhen Tuoshi Network Communications Co. ,Ltd 5G CPE Router NR500-EA RG500UEAABxCOMSLICv3. 2. 2543. 12. 18. It involves incorrect access control that allows attackers to access the SSH protocol without any authentication. This vulnerability does not require user interaction or privileges and can be exploited remotely over the network. The flaw impacts confidentiality by potentially exposing sensitive device access but does not affect integrity or availability. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:04:58 UTC

Technical Analysis

CVE-2024-48442 is a vulnerability identified in the Shenzhen Tuoshi Network Communications Co.,Ltd 5G CPE Router NR500-EA RG500UEAABxCOMSLICv3.2.2543.12.18 firmware. The issue stems from incorrect access control mechanisms that allow an attacker to connect to the router's SSH service without any form of authentication. This means that an attacker with network access to the device can establish an SSH session without credentials, bypassing all authentication controls. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and is exploitable remotely without requiring user interaction or prior privileges. The CVSS v3.1 base score is 6.5, with vector AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating that the attack requires adjacent network access (e.g., local network or VPN), has low attack complexity, no privileges or user interaction needed, and impacts confidentiality with no effect on integrity or availability. No patches or exploits are currently publicly available, but the risk remains significant due to the sensitive nature of SSH access, which can allow attackers to gather sensitive information or pivot within a network. The vulnerability affects a specific firmware version of the router, but the exact range of affected versions is not specified. This flaw could be exploited by attackers to gain unauthorized access to the device's management interface, potentially leading to further compromise of the network environment.

Potential Impact

The primary impact of CVE-2024-48442 is the unauthorized disclosure of sensitive information due to unauthenticated SSH access. Attackers can connect to the router's SSH service without credentials, potentially allowing them to enumerate device configurations, network topology, or other sensitive data. While the vulnerability does not directly allow modification of device settings or denial of service, the exposure of SSH access can facilitate lateral movement within an organization's network, increasing the risk of broader compromise. Organizations relying on this router for 5G CPE connectivity may face increased risk of espionage, data leakage, or network reconnaissance. The vulnerability's requirement for adjacent network access limits remote exploitation but does not eliminate risk, especially in environments with weak network segmentation or exposed internal networks. The absence of known exploits reduces immediate threat but does not preclude future attacks. Overall, the vulnerability undermines the confidentiality of network management interfaces and could serve as a stepping stone for more severe attacks.

Mitigation Recommendations

To mitigate CVE-2024-48442, organizations should implement the following specific measures: 1) Restrict network access to the affected routers' SSH ports by implementing strict firewall rules and network segmentation, ensuring only trusted management hosts can reach the device. 2) Disable SSH access entirely if it is not required for device management. 3) Monitor network traffic for unauthorized SSH connection attempts to the affected devices and establish alerts for suspicious activity. 4) Use VPNs or secure management networks to isolate router management interfaces from general user networks. 5) Regularly audit router configurations to ensure no default or weak credentials are in use and that access controls are properly enforced. 6) Engage with Shenzhen Tuoshi Network Communications or authorized vendors to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 7) Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous SSH access patterns. 8) Educate network administrators about the risks of unauthenticated access and enforce strict operational security policies around device management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b70b7ef31ef0b555783

Added to database: 2/25/2026, 9:36:48 PM

Last enriched: 2/26/2026, 12:04:58 AM

Last updated: 2/26/2026, 7:40:47 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats