CVE-2024-47943

CVSS V2 None CVSS V3 None
Description
The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh script. The signing process is kind of an HMAC with a long string as key which is hard-coded in the firmware and is freely available for download. This allows crafting malicious "signed" .patch files in order to compromise the device and execute arbitrary code.
Overview
  • CVE ID
  • CVE-2024-47943
  • Assigner
  • SEC-VLab
  • Vulnerability Status
  • PUBLISHED
  • Published Version
  • 2024-10-15T08:57:05.068Z
  • Last Modified Date
  • 2024-10-15T13:27:02.820Z
References
Reference URL Reference Tags
https://r.sec-consult.com/rittaliot third-party-advisory
https://www.rittal.com/de-de/products/deep/3124300 patch
History
Created Old Value New Value Data Type Notes
2024-10-16 13:16:17 Added to TrackCVE