Skip to the content.

DIVD-2023-00015 - Yeastar Configuration Panel Takeover

Our reference DIVD-2023-00015
Case lead Rutger Hermens
Researcher(s)
CVE(s)
Product Yeastar N412 and N824
Versions n/a
Recommendation Disable unauthorized access to the login page by routing it through security implementations such as VPNs.
Status Closed
Last modified 09 Mar 2023 09:40 CET

Summary

DIVD has scanned the internet for vulnerable configuration panels on Yeastar N412 and N824 products.

What you can do

Make sure your configuration panel is not accessible from the wider internet. You might do so by, for instance, routing it through a VPN, to ensure only authorized users are able to access the panel.

What we are doing

we have informed the parties that own/operate equipment with the above vulnerability. As we have only found one vulnerable device, we have closed this case.

Timeline

Date Description
20 Jan 2023-
20 Jan 2023
Swascan publishes security advisory.
20 Jan 2023-
31 Jan 2023
DIVD starts scanning for vulnerable configuration panels.
31 Jan 2023-
31 Jan 2023
DIVD informs vulnerable parties.
gantt title DIVD-2023-00015 - Yeastar Configuration Panel Takeover dateFormat YYYY-MM-DD axisFormat %e %b %Y section Case DIVD-2023-00015 - Yeastar Configuration Panel Takeover (13 days) :2023-01-20, 2023-02-02 section Events Swascan publishes security advisory. (0 days) : 2023-01-20, 2023-01-20 DIVD starts scanning for vulnerable configuration panels. (11 days) : 2023-01-20, 2023-01-31 DIVD informs vulnerable parties. (0 days) : 2023-01-31, 2023-01-31

More information