CVE-2024-47943
CVSS V2 None
CVSS V3 None
Description
The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if
the patch files are signed before executing the containing run.sh
script. The signing process is kind of an HMAC with a long string as key
which is hard-coded in the firmware and is freely available for
download. This allows crafting malicious "signed" .patch files in order
to compromise the device and execute arbitrary code.
Overview
- CVE ID
- CVE-2024-47943
- Assigner
- SEC-VLab
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-10-15T08:57:05.068Z
- Last Modified Date
- 2024-10-15T13:27:02.820Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://r.sec-consult.com/rittaliot | third-party-advisory |
https://www.rittal.com/de-de/products/deep/3124300 | patch |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-47943 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47943 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-10-16 13:16:17 | Added to TrackCVE |