CVE-2024-47943

Published at:
2024-10-15T09:15:03.357
Source: 551230f0-3615-47bd-b7cc-93e92e730bbf

Global infos:

The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh script. The signing process is kind of an HMAC with a long string as key which is hard-coded in the firmware and is freely available for download. This allows crafting malicious "signed" .patch files in order to compromise the device and execute arbitrary code.

CVE Status: Awaiting Analysis

References:

  • 551230f0-3615-47bd-b7cc-93e92e730bbf
  • 551230f0-3615-47bd-b7cc-93e92e730bbf
  • Metrics:

    No CVSS data available

    Links:

    Exploit-db
    Github