cve/2024/CVE-2024-47943.md
2025-09-29 21:09:30 +02:00

18 lines
1.0 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-47943](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47943)
![](https://img.shields.io/static/v1?label=Product&message=IoT%20Interface%20%26%20CMC%20III%20Processing%20Unit&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C6.21.00.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature&color=brightgreen)
### Description
The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh script. The signing process is kind of an HMAC with a long string as key which is hard-coded in the firmware and is freely available for download. This allows crafting malicious "signed" .patch files in order to compromise the device and execute arbitrary code.
### POC
#### Reference
- https://r.sec-consult.com/rittaliot
#### Github
No PoCs found on GitHub currently.