mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
18 lines
1.0 KiB
Markdown
18 lines
1.0 KiB
Markdown
|
|
### [CVE-2024-47943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47943)
|
|||
|
|

|
|||
|
|

|
|||
|
|

|
|||
|
|
|
|||
|
|
### Description
|
|||
|
|
|
|||
|
|
The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh script. The signing process is kind of an HMAC with a long string as key which is hard-coded in the firmware and is freely available for download. This allows crafting malicious "signed" .patch files in order to compromise the device and execute arbitrary code.
|
|||
|
|
|
|||
|
|
### POC
|
|||
|
|
|
|||
|
|
#### Reference
|
|||
|
|
- https://r.sec-consult.com/rittaliot
|
|||
|
|
|
|||
|
|
#### Github
|
|||
|
|
No PoCs found on GitHub currently.
|
|||
|
|
|