PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-24215 NOVUS CVE debrief

CVE-2023-24215 describes an unauthenticated access-control failure in the /uci/get/ endpoint of NOVUS AirGate 4G firmware v1.1.16. Per the CVE description, a crafted POST request can reveal administrator credentials, creating a direct path to device takeover. NVD rates the issue CVSS 3.1 9.1/CRITICAL (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) and maps it to CWE-284. The supplied record is still marked 'Awaiting Analysis,' and the vendor/product attribution is weak in the provided corpus, so organizations should verify device identity before acting on assumptions.

Vendor
NOVUS
Product
AirGate 4G firmware
CVSS
CRITICAL 9.1
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-18
Original CVE updated
2026-05-19
Advisory published
2026-05-18
Advisory updated
2026-05-19

Who should care

Network and security teams responsible for NOVUS AirGate 4G devices, especially if management interfaces are reachable from untrusted networks. Incident responders and identity teams should also care because exposed administrator credentials can lead to broader access beyond the gateway itself.

Technical summary

The supplied description says the /uci/get/ endpoint in NOVUS AirGate 4G firmware v1.1.16 lacks proper access control. An unauthenticated attacker can send a crafted POST request and obtain administrator credentials. That makes the issue primarily a confidentiality and privilege-exposure problem that can quickly become full device compromise. The NVD metadata associates the weakness with CWE-284 and rates the attack as network-accessible with no privileges and no user interaction required.

Defensive priority

High. This is a critical, remotely reachable credential-disclosure issue with no authentication barrier, so exposed devices should be treated as urgent.

Recommended defensive actions

  • Identify whether any AirGate/NOVUS devices are running firmware v1.1.16 or otherwise match the referenced product.
  • Restrict access to management and API endpoints, especially from untrusted networks.
  • Monitor vendor channels and the CVE/NVD record for remediation guidance or updated analysis.
  • Rotate administrator credentials on any potentially affected device and review for unauthorized logins or configuration changes.
  • If exposure is confirmed, isolate the device until remediation is in place.
  • Check logs and network telemetry for suspicious POST activity targeting /uci/get/.

Evidence notes

The key facts come from the CVE description and NVD metadata in the supplied corpus: incorrect access control at /uci/get/, unauthenticated credential disclosure via crafted POST, CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N, CWE-284, and NVD status 'Awaiting Analysis.' The reference list includes airgate.com, novus.com, and a GitHub disclosure link referenced from the CVE record, but the vendor mapping is not strongly established in the supplied data.

Official resources

Published in the supplied CVE/NVD record on 2026-05-18 and modified on 2026-05-19; no KEV entry is present in the supplied data. The source corpus does not provide a validated vendor advisory or patch timeline.