// For flags

CVE-2024-5244

TP-Link Omada ER605 Reliance on Security Through Obscurity Vulnerability

Severity Score

5.0
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

TP-Link Omada ER605 Reliance on Security Through Obscurity Vulnerability. This vulnerability allows network-adjacent attackers to access or spoof DDNS messages on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service.

The specific flaw exists within the cmxddnsd executable. The issue results from reliance on obscurity to secure network data. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-22439.

TP-Link Omada ER605 Confianza en la seguridad a través de la vulnerabilidad de oscuridad. Esta vulnerabilidad permite a atacantes adyacentes a la red acceder o falsificar mensajes DDNS en instalaciones afectadas de enrutadores TP-Link Omada ER605. No se requiere autenticación para aprovechar esta vulnerabilidad. Sin embargo, los dispositivos son vulnerables sólo si están configurados para utilizar el servicio DDNS de Comexe. La falla específica existe en el ejecutable cmxddnsd. El problema surge de la dependencia de la oscuridad para proteger los datos de la red. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar código arbitrario en el contexto de la raíz. Era ZDI-CAN-22439.

This vulnerability allows network-adjacent attackers to access or spoof DDNS messages on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service.
The specific flaw exists within the cmxddnsd executable. The issue results from reliance on obscurity to secure network data. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

*Credits: Claroty Research - Team82 - Uri Katz, Noam Moshe, Tomer Goldschmidt, Sharon Brizinov
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-05-22 CVE Reserved
  • 2024-05-23 CVE Published
  • 2024-05-26 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-656: Reliance on Security Through Obscurity
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
---- -