// For flags

CVE-2019-12789

Telus Actiontec T2200H Local Privilege Escalation

Severity Score

6.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered on Actiontec T2200H T2200H-31.128L.08 devices, as distributed by Telus. By attaching a UART adapter to the UART pins on the system board, an attacker can use a special key sequence (Ctrl-\) to obtain a shell with root privileges. After gaining root access, the attacker can mount the filesystem read-write and make permanent modifications to the device including bricking of the device, disabling vendor management of the device, preventing automatic upgrades, and permanently installing malicious code on the device.

Se detecto un problema en los dispositivos Actiontec T2200H T2200H-31.128L.08, distribuidos por Telus. Mediante la fijación de un adaptador UART a los pines UART en la placa base, un atacante puede utilizar una secuencia de teclas especial (Ctrl- ) para obtener un shell con privilegios root. Después de obtener acceso root, el atacante puede montar el sistema de archivos de lectura y escritura y realizar modificaciones permanentes en el dispositivo, incluido el bloqueo del dispositivo, deshabilitar la administración del proveedor del dispositivo, evitar actualizaciones automáticas e instalar permanentemente código malicioso en el dispositivo.

Telus Actiontec T2200H with firmware T2200H-31.128L.08 suffers from a local privilege escalation vulnerability.

*Credits: N/A
CVSS Scores
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-06-10 CVE Reserved
  • 2019-06-12 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (2)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Actiontec
Search vendor "Actiontec"
T2200h Firmware
Search vendor "Actiontec" for product "T2200h Firmware"
t2200h-31.1238l.08
Search vendor "Actiontec" for product "T2200h Firmware" and version "t2200h-31.1238l.08"
-
Affected
in Actiontec
Search vendor "Actiontec"
T2200h
Search vendor "Actiontec" for product "T2200h"
--
Safe