People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations

ACSC Cyber Information update

Summary

The Federal Bureau of Investigation (FBI), Cyber National Mission Force (CNMF), and National Security Agency (NSA) assess that People’s Republic of China (PRC)-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home office (SOHO) routers, firewalls, network-attached storage (NAS) and Internet of Things (IoT) devices with the goal of creating a network of compromised nodes (a “botnet”) positioned for malicious activity. The actors may then use the botnet as a proxy to conceal their identities while deploying distributed denial of service (DDoS) attacks or compromising targeted U.S. networks.

Integrity Technology Group, a PRC-based company, has controlled and managed a botnet active since mid-2021. The botnet has regularly maintained between tens to hundreds of thousands of compromised devices. As of June 2024, the botnet consisted of over 260,000 devices. Victim devices part in the botnet have been observed in North America, South America, Europe, Africa, Southeast Asia and Australia.

While devices aged beyond their end-of-life dates are known to be more vulnerable to intrusion, many of the compromised devices in the Integrity Tech controlled botnet are likely still supported by their respective vendors.

FBI, CNMF, NSA, and allied partners are releasing this Joint Cyber Security Advisory to highlight the threat posed by these actors and their botnet activity and to encourage exposed device vendors, owners, and operators to update and secure their devices from being compromised and joining the botnet. Network defenders are advised to follow the guidance in the mitigations section to protect against the PRC-linked cyber actors’ botnet activity. Cyber security companies can also leverage the information in this advisory to assist with identifying malicious activity and reducing the number of devices present in botnets worldwide.


More information

Any of the devices mentioned below may be affected. Ensure that the software of these products are up to date. If a product is deemed end-of-life by the vendor, replace it with a new one.

For Australia please pay specific attention to the home routers from Telstra, D-link, Netgate and Netgear. Also for small/medium businesses who have adopted the Cisco Small Business routers, ensure these are running the latest firmware.

CVEVendorProductVersions affectedVulnerability type
CVE-2024-5217ServiceNowNow PlatformWashington DC, Vancouver, and earlier Now Platform releasesRCE
CVE-2024-4577PHP GroupPHPPHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on WindowsOS command injection
CVE-2024-29973ZyxelNAS326NAS542NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0OS command injection
CVE-2024-29269TelesquareTLR-2005Ksh1.0.0 and 1.1.4Arbitrary system commands
CVE-2024-21762FortinetFortiOSFortiOS 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17,RCE
FortiProxyFortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7
CVE-2023-50386ApacheSolr6.0.0 through 8.11.2, 9.0.0 before 9.4.1Unrestricted file upload
CVE-2023-47218QNAPQTS
QuTS hero
QuTScloud
QTS 5.1.x before 5.1.5.2645 build 20240116,
QuTS hero h5.1.x before h5.1.5.2647 build 20240118,
QuTScloud c5.x before c5.1.5.2651
OS command injection
CVE-2023-46747F5F5 Big-IPBig-IP (all modules) 17.1.0-17.1., 16.1.0-16.1.4, 15.1.0-15.1.10, 14.1.0-14.1.5,13.1.0-13.1.5Authentication bypass
CVE-2023-46604ApacheApache ActiveMQbefore 5.15.16, 5.16.7, 5.17.6, or 5.18.3RCE
CVE-2023-43478TelstraSmart Modem Gen 2Firmware versions  before 0.18.15rCode execution as root
CVE-2023-4166Tongda OATongda200011.10SQL injection
CVE-2023-38646MetabaseMetabase and Metabase  EnterpriseMetabase before 0.46.6.1, Metabase Enterprise before 1.46.6.1Arbitrary command execution 
CVE-2023-3852OpenRapidYuque RapidCMSUp to version 1.3.1Arbitrary file upload
CVE-2023-38035IvantiMobileIron Sentry (MICS Admin Portal)9.18.0 and belowAuthentication bypass
CVE-2023-37582ApacheRocketMQ5.1.1Remote command execution
CVE-2023-36844JuniperJuniper Junos20.4, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4PHP external variable modification
CVE-2023-36542ApacheApache NiFi0.0.2 through 1.22.0Code injection
CVE-2023-35885CloudPanelCloudPanel 2before 2.3.1Insecure file-manager cookie authentication
CVE-2023-35843NocoDBNocoDBThrough 0.106.0 (or 0.109.1)Path traversal
CVE-2023-3519CitrixNetscaler Gateway, Application Delivery Controller (ADC)12.1-NDcPP before 55.297, 12.1-FIPS before 55.297, 13.1-FIPS before 37.159, 13.0 before 91.13, 13.1 before 49.13Unauthenticated remote code execution
CVE-2023-35081IvantiEndpoint Manager Mobile (EPMM)11.10x<11.10.0.3, 11.9x<11.91.2, and 11.8<11.8.12Path traversal
CVE-2023-34960ChamiloChamilov1.11.* up to v1.11.18Command injection
CVE-2023-34598GibboneduGibbon25.0.00Local File Inclusion (LFI) vulnerability
CVE-2023-3368ChamiloChamilo LMS<= v1.11.20Command injection leading to remote code execution (RCE)
Bypass of CVE-2023-34960
CVE-2023-33510WordPressJeecg P3 Bix ChatJeecg P3 Biz Chat Project Jeecg P3 Biz Chat 1.0.5Allows remote attackers to read arbitrary files
CVE-2023-30799MikroTikMikroTik RouterOSStable before 6.49.7 and long-term through 6.48.6Privilege escalation
CVE-2023-28771ZyxelZyWALL/USG seriesZyWALL/USG ZLD 4.60 to 4.73, VPN ZLD 4.60 to 5.35, USG FLEX ZLD 4.60 to 5.35, ATP ZLD 4.60 to 5.35OS command injection
CVE-2023-28365UbiquitiUI UniFi7.3.83 and earlierBackup file vulnerability
CVE-2023-27997FortinetFortiOSFortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and belowBuffer overflow 
FortiProxyFortiProxy 7.2.3 and below, 7.0.9 and below, 2.0.12 and below, 1.2 all versions, 1.1 all versions
CVE-2023-27524ApacheApache SupersetVersions up to and including 2.0.1.Authenticate and access unauthorized resources
CVE-2023-26469JoraniJorani1.0.0Path traversal to RCE
CVE-2023-25690ApacheApache HTTP Server2.4.0 through 2.4.55HTTP request smuggling
CVE-2023-24229DrayTekVigor2960Firmware v1.5.1.4
No longer supported by maintainer
Command injection
CVE-2023-23333ContecSolarView CompactFirmware through 6.00Command injection
CVE-2023-22527ConfluenceData Center and Server< 8.5.5 (LTS)
< 8.7.2 (Data Center Only)
Template injection leading to RCE
CVE-2023-22515ConfluenceData Center and Server>=8.0.0, >= 8.1.0, >=8.2.0, >=8.30 to <8.3.3, >=8.4.0 to <8.4.3, >=8.5.0 to <8.5.2Privilege escalation
CVE-2022-42475FortinetFortiOSFortiOS SSL-VPN 7.2.0 through 7.22, 7.00 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.211, 6.0.15 and earlierBuffer overflow 
FortiProxyFortiProxy SSL VPN 7.2.0 through 7.2.1, 7.0.7 and earlier.
CVE-2022-40881ContecSolarView CompactFirmware 6.00Command injection
CVE-2022-3590WordPress  WordPressWordPress 4.1Unauthenticated blind SSRF in the pingback feature
CVE-2022-31814NetgatepfSense pfBlockerNGThrough 2.1.4_26OS command injection
CVE-2022-30525ZyxelUSG FLEX, ATP, and VPN series firmwareUSG FLEX 100(W)/200/500/700 ZLD 5.00 through 5.21 Patch 1, USG FLEX 50(W)/USG20(W)-VPN ZLD 5.10 through 5.21 Patch 1, ATP series ZLD 5.10 through 5.21 Patch 1, 
VPN series ZLD 4.60 through 5.21 Patch 1
OS command injection
CVE-2022-26134AtlassianConfluence Data Center7.18.0OGNL Injection
Confluence server
CVE-2022-20707CiscoSmall Business Series RoutersRV160, RV260, RV340, and RV345RCE
CVE-2022-1388F5BIG-IP16.1.x versions prior to 16.1.2.2, 
15.1.x versions prior to 15.1.5.1, 
14.1.x versions prior to 14.1.4.6, 
13.1.x versions prior to 13.1.5, 
all 12.1.x and 11.6.x versions
Authentication bypass
CVE-2021-46422TelesquareSDT-CW3B11.1.0OS command injection
CVE-2021-45511NETGEARNETGEARAC2100 before 2021-08-27,
AC2400 before 2021-08-27,
AC2600 before 2021-08-27,
D7000 before 2021-08-27,
R6220 before 2021-08-27,
R6230 before 2021-08-27,
R6260 before 2021-08-27,
R6330 before 2021-08-27,
R6350 before 2021-08-27,
R6700v2 before 2021-08-27,
R6800 before 2021-08-27,
R6850 before 2021-08-27,
R6900v2 before 2021-08-27,
R7200 before 2021-08-27,
R7350 before 2021-08-27,
R7400 before 2021-08-27,
R7450 before 2021-08-27
Authentication bypass 
CVE-2021-44228ApacheLog4j22.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1)Input validation code execution
CVE-2021-36260Hikvision Web servers firmwareVarious DS-2CD, DS-2X, DS-2DY, PTZ-N, DS-2DF, DS-2TD, IDS, DS-76, DS-71 Command injection
CVE-2021-28799QNAP Systems Inc.Hybrid Backup Sync (HBS) 3versions prior to v16.0.0415 on QTS 4.5.2; 
versions prior to v3.0.210412 on QTS 4.3.6; 
versions prior to v3.0.210411 on QTS 4.3.4; 
versions prior to v3.0.210411 on QTS 4.3.3; 
versions prior to v16.0.0419 on QuTS hero h4.5.1; 
versions prior to v16.0.0419 on QuTScloud c4.5.1~c4.5.4
Improper authorization
CVE-2021-20090Buffalo ArcadyanBuffalo WSRArcadyan firmwareWSR-2533DHPL2 firmware version <= 1.02,
WSR-2533DHP3 firmware version <= 1.24
Path traversal
CVE-2021-1473CiscoSmall Business RV Series RoutersRV340/RV340W, RV345/RV345P before 1.0.03.21OS command injection
CVE-2021-1472CiscoSmall Business Series Routers firmwareRV160, RV160W, RV260, RV260P, RV260W, RV340, RV340W, RV345, RV345PArbitrary code execution
CVE-2020-8515DrayTek VigorVigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, 1.4.4_BetaRCE
CVE-2020-4450IBMWebSphere Application Server8.5 and 9.0 traditionalArbitrary code execution
CVE-2020-35391TendaTenda F3 FirmwareTenda F3 Firmware 12.01.01.48Forced browsing
CVE-2020-3452Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) SoftwareASA <9.6.4.42, <9.8.4.20, <9.9.2.74, <9.10.1.42, <9.12.3.12, <9.13.1.10, <9.14.1.10
FTD <6.2.3.16, <6.3.0.6, <6.4.0.10, <6.5.05, <6.6.0.1
Path traversal
CVE-2020-3451CiscoSmall Business Series Routers FirmwareRV340W, 
RV340, 
RV345,
RV345P
Multiple Security Vulnerabilities – like Buffer overflow via environment variables, server side include (SSI) injection 
CVE-2020-15415DrayTek Vigor Firmware3900, 2960, and 300bCommand injection
CVE-2019-7256Linear eMergeE3-SeriesNortekcontrol Linear Emerge Essential Firmware
Nortekcontrol Linear Emerge Elite Firmware
Command injection
CVE-2019-19824TOTOLINK Realtek SDK based routersA3002Ru through 2.0.0, A702R through 2.1.3, N301Rt through 2.16, N302R through 3.4.0, N300Rt through 3.4.0, N200Re through 4.0.0, N150Rt through 3.4.0, N100Re through 3.4.0, N302RE through 2.0.2OS command injection
CVE-2019-17621D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 DIR-818Lx Bx <=v2.05b03_Beta08, DIR-822 Bx <=v2.03b01, DIR-822 Cx <=v3.12b04, DIR-823 Ax <=v1.00b06_Beta, DIR-859 Ax <=v1.06b01Beta01, DIR-868L Ax <=v1.12b04, DIR-868L Bx <=v2.05b02, DIR-869 Ax <=v1.03b02Beta02, DIR-880L Ax <=v1.08b04, DIR-890L/R Ax <=v1.11b01_Beta01, DIR-885L/R Ax <=v1.12b05, DIR-895L/R Ax <=v1.12b10 OS command injection related to UPnP service
CVE-2019-12168Four-Faith Four-Faith Wireless Mobile Router F3x24Firmware 1.0RCE via command shell 
CVE-2019-11829Microsoft Windows 10 
Server 2016
Server 2016
1607
1703
OS command injection
CVE-2018-18852Cerio Cerio Dt-300N FirmwareCerio Dt-300nDT-300N 1.1.6 through 1.1.12 devicesOS command injection
CVE-2017-7876QNAPQTS  QTS 4.2.6 before build 20170517, QTS 4.3.3.0174 before build 20170503Command injection 
CVE-2015-7450IBMTivoli Common Reporting3.1.0.2, 3.1, 3.1.2, 3.1.2.1, 2.1, 2.1.1.2, 3.1.0.1, 2.1.1, Code injection

See the ACSC page for more information over here.

Leave a Comment

Scroll to Top