PatchSiren cyber security CVE debrief
CVE-2023-24215 NOVUS CVE debrief
CVE-2023-24215 describes an unauthenticated access-control failure in the /uci/get/ endpoint of NOVUS AirGate 4G firmware v1.1.16. Per the CVE description, a crafted POST request can reveal administrator credentials, creating a direct path to device takeover. NVD rates the issue CVSS 3.1 9.1/CRITICAL (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) and maps it to CWE-284. The supplied record is still marked 'Awaiting Analysis,' and the vendor/product attribution is weak in the provided corpus, so organizations should verify device identity before acting on assumptions.
- Vendor
- NOVUS
- Product
- AirGate 4G firmware
- CVSS
- CRITICAL 9.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-18
- Original CVE updated
- 2026-05-19
- Advisory published
- 2026-05-18
- Advisory updated
- 2026-05-19
Who should care
Network and security teams responsible for NOVUS AirGate 4G devices, especially if management interfaces are reachable from untrusted networks. Incident responders and identity teams should also care because exposed administrator credentials can lead to broader access beyond the gateway itself.
Technical summary
The supplied description says the /uci/get/ endpoint in NOVUS AirGate 4G firmware v1.1.16 lacks proper access control. An unauthenticated attacker can send a crafted POST request and obtain administrator credentials. That makes the issue primarily a confidentiality and privilege-exposure problem that can quickly become full device compromise. The NVD metadata associates the weakness with CWE-284 and rates the attack as network-accessible with no privileges and no user interaction required.
Defensive priority
High. This is a critical, remotely reachable credential-disclosure issue with no authentication barrier, so exposed devices should be treated as urgent.
Recommended defensive actions
- Identify whether any AirGate/NOVUS devices are running firmware v1.1.16 or otherwise match the referenced product.
- Restrict access to management and API endpoints, especially from untrusted networks.
- Monitor vendor channels and the CVE/NVD record for remediation guidance or updated analysis.
- Rotate administrator credentials on any potentially affected device and review for unauthorized logins or configuration changes.
- If exposure is confirmed, isolate the device until remediation is in place.
- Check logs and network telemetry for suspicious POST activity targeting /uci/get/.
Evidence notes
The key facts come from the CVE description and NVD metadata in the supplied corpus: incorrect access control at /uci/get/, unauthenticated credential disclosure via crafted POST, CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N, CWE-284, and NVD status 'Awaiting Analysis.' The reference list includes airgate.com, novus.com, and a GitHub disclosure link referenced from the CVE record, but the vendor mapping is not strongly established in the supplied data.
Official resources
Published in the supplied CVE/NVD record on 2026-05-18 and modified on 2026-05-19; no KEV entry is present in the supplied data. The source corpus does not provide a validated vendor advisory or patch timeline.