15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials
The latest news on the Four-Faith router exploit CVE-2024-12856, an OS command injection vulnerability, is as follows:
CVE-2024-12856 Exploitation:
- Vulnerability Details: VulnCheck has discovered that a new vulnerability affecting Four-Faith industrial routers has been exploited in the wild. The vulnerability, tracked as CVE-2024-12856, is an OS command injection flaw15.
- Severity: The vulnerability is rated as critical, with a CVSS score of 9.3 out of a maximum of 10, indicating high severity5.
- Exploitation: There is evidence that this vulnerability has been exploited in real-world attacks, highlighting the need for immediate action to secure affected systems15.
Default Credentials Security Flaws:
- General Issue: Many routers, including those from Four-Faith, often come with default credentials that are not changed by users. This lack of password change leaves these devices vulnerable to exploitation by attackers3.
- Specific to Four-Faith: The specific vulnerability CVE-2024-12856 is not directly related to default credentials, but the broader issue of default credentials being left unchanged is a common security flaw that can be exploited by attackers to gain access to routers and other network devices13.
Recommendations:
- Update Firmware: Users are advised to update their firmware to the latest version to address this vulnerability. Regular firmware updates are crucial for fixing security vulnerabilities and improving router security35.
- Change Default Credentials: It is essential to change default credentials to strong, unique passwords to prevent unauthorized access. This simple step can significantly enhance the security of network devices3.
In summary, the CVE-2024-12856 vulnerability in Four-Faith industrial routers is a critical OS command injection flaw that has been exploited in the wild. Users must update their firmware and change default credentials to secure their devices against such attacks.