CVE-2024-47943

Oct. 15, 2024, 12:57 p.m.

Product(s) Impacted

Rittal IoT Interface

CMC III Processing Unit

Description

The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh script. The signing process is kind of an HMAC with a long string as key which is hard-coded in the firmware and is freely available for download. This allows crafting malicious "signed" .patch files in order to compromise the device and execute arbitrary code.

Weaknesses

CWE-347
Improper Verification of Cryptographic Signature

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

CWE ID: 347

Date

Published: Oct. 15, 2024, 9:15 a.m.

Last Modified: Oct. 15, 2024, 12:57 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

551230f0-3615-47bd-b7cc-93e92e730bbf

References

https://r.sec-consult.com/rittaliot
551230f0-3615-47bd-b7cc-93e92e730bbf
https://www.rittal.com/de-de/products/deep/3124300
551230f0-3615-47bd-b7cc-93e92e730bbf