CVE-2018-25147
Hardcoded Credentials in Microhard IPn4G Allow Root Access
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microhard_systems | ipn4g | 1.1.0 |
| microhard_systems | vip4gb | * |
| microhard_systems | dragon-lte | * |
| microhard_systems | bullet-3g | * |
| microhard_systems | vip4g-wifi-n | * |
| microhard_systems | ipn3gii | * |
| microhard_systems | bullet-lte | * |
| microhard_systems | bulletplus | * |
| microhard_systems | httpd-ssl | 1.0.0 |
| microhard_systems | vip4g | * |
| microhard_systems | ipn3gb | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1392 | The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves Microhard Systems IPn4G and other related 3G/4G Cellular Ethernet and Serial Gateway devices containing hardcoded default credentials embedded in their Linux-based firmware. These credentials cannot be changed through normal device operations and are not disclosed to end-users. Attackers can exploit these default usernames and passwords to remotely log into the device, gaining unauthorized access and potentially escalating privileges to root, thereby compromising the entire system. [1, 2]
How can this vulnerability impact me? :
The vulnerability allows remote attackers to bypass authentication by using hardcoded default credentials, leading to unauthorized root-level access to the affected devices. This can result in full system compromise, allowing attackers to control critical industrial communication gateways that handle data transport over cellular networks. Such control could disrupt operations, expose sensitive data, or allow further attacks within the network. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to log in to the affected Microhard Systems devices using the known hardcoded default credentials such as 'admin:admin', 'upgrade:admin', 'testlab:testlab', and 'msshc:msshc'. Network scanning tools can be used to identify devices running the vulnerable firmware versions (e.g., IPn4G 1.1.0 build 1098). Commands such as 'nmap' can be used to scan for open management ports (e.g., SSH or HTTP/HTTPS) on these devices. For example, 'nmap -p 22,80,443 <target-ip>' to identify accessible services. Then, manual or automated login attempts using the default credentials can confirm vulnerability. Additionally, checking device banners or firmware versions via HTTP headers or SSH login prompts may help identify affected devices. [2, 1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include isolating the affected devices from untrusted networks to prevent unauthorized access, restricting network access to management interfaces using IP/MAC access control lists or firewall rules, and monitoring for unauthorized login attempts. Since the default credentials are hardcoded and cannot be changed through normal operations, consider replacing vulnerable devices with updated or patched models if available. Additionally, disable remote management interfaces if not required and implement network segmentation to limit exposure. Applying compensating controls such as VPNs or additional authentication layers can also help reduce risk. [1, 2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers to gain unauthorized root-level access to critical communication devices by exploiting hardcoded default credentials that cannot be changed. This unauthorized access can lead to full system compromise, potentially exposing sensitive data and disrupting secure communications. Such a security breach undermines the confidentiality and integrity of data, which are key requirements in compliance standards like GDPR and HIPAA. Therefore, the presence of this vulnerability can negatively impact compliance with these regulations by increasing the risk of data breaches and unauthorized data access. [1, 2]