INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Multiple sectors HIGH 54m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h Global data_breach Multiple sectors HIGH 54m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h Global data_breach Multiple sectors HIGH 54m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h
Vulnerabilities

CVE-2020-24363

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
TP-link TL-WA855RE Missing Authentication for Critical Function Vulnerability — TP-link TL-WA855RE contains a missing authentication for critical function vulnerability. This vulnerability could allow
Published: Sep 2, 2025  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

TP-link TL-WA855RE Missing Authentication for Critical Function Vulnerability — TP-link TL-WA855RE contains a missing authentication for critical function vulnerability. This vulnerability could allow an unauthenticated attacker (on the same network) to submit a TDDP_RESET POST request for a factory reset and reboot. The attacker can then obtain incorrect access control by setting a new administrative password. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

🤖 AI Executive Summary

CVE-2020-24363 is a critical missing authentication vulnerability (CVSS 9.0) in the TP-Link TL-WA855RE Wi-Fi range extender that allows any unauthenticated attacker on the same network segment to trigger a factory reset via a crafted TDDP_RESET POST request. Following the reset, the attacker can set a new administrative password, effectively seizing full control of the device. This vulnerability is particularly dangerous in shared or semi-trusted network environments such as offices, hotels, and residential complexes. A public exploit is available, and the device is likely end-of-life with no further vendor support expected.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 19, 2026 02:17
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using TP-Link TL-WA855RE range extenders in office environments, branch networks, or guest Wi-Fi setups are directly at risk. Key sectors include: Government entities and ministries using low-cost network extenders in secondary offices; SMEs and retail businesses relying on consumer-grade networking equipment; Hospitality and real estate sectors (hotels, malls, residential compounds) where shared Wi-Fi infrastructure is common; Healthcare clinics and smaller facilities using budget networking gear. An attacker with physical proximity or access to the same network (e.g., a guest Wi-Fi segment) could reset the device, reconfigure it as a rogue access point, intercept traffic, or pivot deeper into the internal network — posing significant risks to NCA ECC compliance and SAMA CSF requirements for network security.
🏢 Affected Saudi Sectors
Government Healthcare Hospitality Retail Education SME/Commercial Real Estate
⚖️ Saudi Risk Score (AI)
8.5
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Audit all network infrastructure to identify any deployed TP-Link TL-WA855RE devices immediately.
2. Isolate identified devices from critical network segments pending replacement.
3. If the device cannot be immediately replaced, restrict physical and logical network access to the device management interface using firewall ACLs or VLAN segmentation.

PATCHING GUIDANCE:
4. The device is end-of-life (EoL); no further firmware patches are expected from TP-Link. Discontinue use immediately as recommended by the vendor.
5. Replace with a supported, actively maintained Wi-Fi range extender or access point from a vendor with a current security support lifecycle.

COMPENSATING CONTROLS (if immediate replacement is not possible):
6. Implement strict network segmentation — place the device on an isolated VLAN with no access to internal resources.
7. Deploy network-level firewall rules to block TDDP protocol traffic (UDP/TCP port 1040) from untrusted hosts.
8. Enable 802.1X port-based authentication on the upstream switch port to limit who can communicate with the device.
9. Monitor for unexpected factory reset events or new DHCP leases indicating device reconfiguration.

DETECTION RULES:
10. Create IDS/IPS signatures to detect TDDP_RESET POST requests targeting port 1040.
11. Alert on unexpected administrative login attempts or password change events on network devices.
12. Monitor SIEM for rogue DHCP server activity or ARP anomalies that may indicate device takeover.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. مراجعة جميع البنية التحتية للشبكة فوراً لتحديد أي أجهزة TP-Link TL-WA855RE مُنشرة.
2. عزل الأجهزة المُحددة عن قطاعات الشبكة الحيوية ريثما يتم استبدالها.
3. إذا تعذّر الاستبدال الفوري، تقييد الوصول المادي والمنطقي لواجهة إدارة الجهاز باستخدام قوائم التحكم بالوصول أو تقسيم الشبكة إلى VLANs.

إرشادات التصحيح:
4. الجهاز منتهي الدعم (EoL) ولا يُتوقع صدور تحديثات أمنية من TP-Link؛ يُوصى بإيقاف استخدامه فوراً.
5. استبداله بنقطة وصول أو موسّع Wi-Fi مدعوم بتحديثات أمنية نشطة.

ضوابط تعويضية (إذا تعذّر الاستبدال الفوري):
6. تطبيق تقسيم صارم للشبكة بوضع الجهاز في VLAN معزولة بدون وصول للموارد الداخلية.
7. تطبيق قواعد جدار الحماية لحجب حركة بروتوكول TDDP (المنفذ 1040) من المضيفين غير الموثوقين.
8. تفعيل مصادقة 802.1X على منفذ المحوّل المتصل بالجهاز للحد من الاتصالات غير المصرح بها.
9. مراقبة أحداث إعادة الضبط غير المتوقعة أو عناوين DHCP الجديدة التي قد تشير إلى إعادة تهيئة الجهاز.

قواعد الكشف:
10. إنشاء توقيعات IDS/IPS للكشف عن طلبات TDDP_RESET POST الموجهة للمنفذ 1040.
11. التنبيه على محاولات تسجيل الدخول الإدارية غير المتوقعة أو أحداث تغيير كلمة المرور.
12. مراقبة SIEM لرصد نشاط خادم DHCP مارق أو شذوذات ARP قد تشير إلى الاستيلاء على الجهاز.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2-1: Asset Management — unmanaged EoL devices ECC-3-3-3: Network Security — network segmentation and access control ECC-3-3-5: Wireless Security — securing wireless infrastructure ECC-3-3-1: Identity and Access Management — authentication for critical functions ECC-2-5: Vulnerability Management — patching and EoL device management
🔵 SAMA CSF
3.3.6 Network Security Management — segmentation and access controls 3.3.2 Identity and Access Management — authentication enforcement 3.3.9 Vulnerability Management — EoL device risk management 3.3.7 Wireless Security — securing wireless network components 3.2.1 Asset Management — inventory and lifecycle management
🟡 ISO 27001:2022
A.8.8 Management of technical vulnerabilities A.8.20 Networks security A.8.21 Security of network services A.5.9 Inventory of information and other associated assets A.8.3 Information access restriction A.8.22 Segregation of networks
🟣 PCI DSS v4.0
Requirement 1.3 — Network access controls between trusted and untrusted networks Requirement 6.3 — Security vulnerabilities are identified and addressed Requirement 12.3 — Hardware and software technologies reviewed for vulnerabilities
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
TP-Link:TL-WA855RE
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS11.07%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2025-09-23
Published 2025-09-02
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
8.5
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.