CVE-2024-58300: CWE-306: Missing Authentication for Critical Function in Siklu MultiHaul TG series
Siklu MultiHaul TG series devices before version 2.0.0 contain an unauthenticated vulnerability that allows remote attackers to retrieve randomly generated credentials via a network request. Attackers can send a specific hex-encoded command to port 12777 to obtain username and password, enabling direct SSH access to the device.
AI Analysis
Technical Summary
CVE-2024-58300 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in Siklu MultiHaul TG series wireless communication devices prior to version 2.0.0. The flaw allows unauthenticated remote attackers to extract randomly generated device credentials by sending a specially crafted hex-encoded command to UDP/TCP port 12777. This port listens for management commands, but due to missing authentication controls, the device responds with the username and password in clear text. With these credentials, attackers gain direct SSH access to the device, enabling full control over its configuration and operation. The vulnerability does not require any prior authentication, user interaction, or privileges, and can be exploited remotely over the network, making it highly accessible to attackers. The CVSS 4.0 base score is 8.7, indicating a high severity with network attack vector, low attack complexity, no privileges required, and no user interaction. The vulnerability impacts confidentiality severely by exposing credentials, and integrity and availability could be compromised through unauthorized device control. No public exploits or active exploitation have been reported yet, but the ease of exploitation and critical nature of the device's role in wireless backhaul networks make this a significant threat. The vendor has released version 2.0.0 to address this issue, though no patch links were provided in the source data. The vulnerability affects all devices running versions before 2.0.0, which may be widely deployed in telecom and municipal wireless infrastructure.
Potential Impact
For European organizations, especially telecom operators, internet service providers, and municipal network operators relying on Siklu MultiHaul TG series devices, this vulnerability poses a critical risk. Unauthorized SSH access can lead to full device compromise, allowing attackers to intercept, manipulate, or disrupt wireless backhaul communications. This can degrade network availability, cause data breaches, and facilitate lateral movement into broader network infrastructure. Given the role of these devices in critical communication links, exploitation could impact essential services, emergency communications, and business operations. The exposure of credentials also increases the risk of persistent unauthorized access and potential deployment of malware or ransomware. The lack of authentication requirement and remote exploitability heighten the threat level. European organizations with regulatory obligations under GDPR and NIS Directive may face compliance and reputational risks if such devices are compromised. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity demands urgent attention.
Mitigation Recommendations
1. Upgrade all Siklu MultiHaul TG series devices to firmware version 2.0.0 or later, where the vulnerability is fixed. 2. Restrict network access to port 12777 using firewall rules or network segmentation to limit exposure only to trusted management networks. 3. Implement strict access control policies and monitor SSH login attempts for unusual activity. 4. Employ network intrusion detection systems (NIDS) to detect anomalous traffic targeting port 12777 or unusual SSH sessions. 5. Regularly audit device configurations and credentials to ensure no unauthorized changes have occurred. 6. Coordinate with Siklu support for any additional security advisories or patches. 7. Consider deploying multi-factor authentication (MFA) for device management where supported. 8. Maintain an inventory of all affected devices to ensure comprehensive remediation. 9. Conduct penetration testing and vulnerability scanning focused on wireless backhaul infrastructure to identify residual risks. 10. Establish incident response plans specific to network device compromise scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Austria
CVE-2024-58300: CWE-306: Missing Authentication for Critical Function in Siklu MultiHaul TG series
Description
Siklu MultiHaul TG series devices before version 2.0.0 contain an unauthenticated vulnerability that allows remote attackers to retrieve randomly generated credentials via a network request. Attackers can send a specific hex-encoded command to port 12777 to obtain username and password, enabling direct SSH access to the device.
AI-Powered Analysis
Technical Analysis
CVE-2024-58300 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in Siklu MultiHaul TG series wireless communication devices prior to version 2.0.0. The flaw allows unauthenticated remote attackers to extract randomly generated device credentials by sending a specially crafted hex-encoded command to UDP/TCP port 12777. This port listens for management commands, but due to missing authentication controls, the device responds with the username and password in clear text. With these credentials, attackers gain direct SSH access to the device, enabling full control over its configuration and operation. The vulnerability does not require any prior authentication, user interaction, or privileges, and can be exploited remotely over the network, making it highly accessible to attackers. The CVSS 4.0 base score is 8.7, indicating a high severity with network attack vector, low attack complexity, no privileges required, and no user interaction. The vulnerability impacts confidentiality severely by exposing credentials, and integrity and availability could be compromised through unauthorized device control. No public exploits or active exploitation have been reported yet, but the ease of exploitation and critical nature of the device's role in wireless backhaul networks make this a significant threat. The vendor has released version 2.0.0 to address this issue, though no patch links were provided in the source data. The vulnerability affects all devices running versions before 2.0.0, which may be widely deployed in telecom and municipal wireless infrastructure.
Potential Impact
For European organizations, especially telecom operators, internet service providers, and municipal network operators relying on Siklu MultiHaul TG series devices, this vulnerability poses a critical risk. Unauthorized SSH access can lead to full device compromise, allowing attackers to intercept, manipulate, or disrupt wireless backhaul communications. This can degrade network availability, cause data breaches, and facilitate lateral movement into broader network infrastructure. Given the role of these devices in critical communication links, exploitation could impact essential services, emergency communications, and business operations. The exposure of credentials also increases the risk of persistent unauthorized access and potential deployment of malware or ransomware. The lack of authentication requirement and remote exploitability heighten the threat level. European organizations with regulatory obligations under GDPR and NIS Directive may face compliance and reputational risks if such devices are compromised. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity demands urgent attention.
Mitigation Recommendations
1. Upgrade all Siklu MultiHaul TG series devices to firmware version 2.0.0 or later, where the vulnerability is fixed. 2. Restrict network access to port 12777 using firewall rules or network segmentation to limit exposure only to trusted management networks. 3. Implement strict access control policies and monitor SSH login attempts for unusual activity. 4. Employ network intrusion detection systems (NIDS) to detect anomalous traffic targeting port 12777 or unusual SSH sessions. 5. Regularly audit device configurations and credentials to ensure no unauthorized changes have occurred. 6. Coordinate with Siklu support for any additional security advisories or patches. 7. Consider deploying multi-factor authentication (MFA) for device management where supported. 8. Maintain an inventory of all affected devices to ensure comprehensive remediation. 9. Conduct penetration testing and vulnerability scanning focused on wireless backhaul infrastructure to identify residual risks. 10. Establish incident response plans specific to network device compromise scenarios.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-12-11T00:58:28.457Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693b3df322246175c6a47125
Added to database: 12/11/2025, 9:56:03 PM
Last enriched: 12/11/2025, 10:11:34 PM
Last updated: 12/14/2025, 10:28:18 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14672: Heap-based Buffer Overflow in gmg137 snap7-rs
MediumCVE-2025-14674: Injection in aizuda snail-job
MediumCVE-2025-14673: Heap-based Buffer Overflow in gmg137 snap7-rs
MediumCVE-2025-14668: SQL Injection in campcodes Advanced Online Examination System
MediumCVE-2025-14667: SQL Injection in itsourcecode COVID Tracking System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.