### [CVE-2024-47943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47943) ![](https://img.shields.io/static/v1?label=Product&message=IoT%20Interface%20%26%20CMC%20III%20Processing%20Unit&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature&color=brighgreen) ### Description The firmware upgrade function in the admin web interface of the RittalĀ IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh script. The signing process is kind of an HMAC with a long string as key which is hard-coded in the firmware and is freely available for download. This allows crafting malicious "signed" .patch files in order to compromise the device and execute arbitrary code. ### POC #### Reference - https://r.sec-consult.com/rittaliot #### Github No PoCs found on GitHub currently.