The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if
the patch files are signed before executing the containing run.sh
script. The signing process is kind of an HMAC with a long string as key
which is hard-coded in the firmware and is freely available for
download. This allows crafting malicious "signed" .patch files in order
to compromise the device and execute arbitrary code.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Oct 2024 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh script. The signing process is kind of an HMAC with a long string as key which is hard-coded in the firmware and is freely available for download. This allows crafting malicious "signed" .patch files in order to compromise the device and execute arbitrary code. | |
Title | Improper signature verification of firmware upgrade files | |
Weaknesses | CWE-347 | |
References |
|
MITRE
Status: PUBLISHED
Assigner: SEC-VLab
Published: 2024-10-15T08:57:05.068Z
Updated: 2024-10-15T13:27:02.820Z
Reserved: 2024-10-07T13:39:52.543Z
Link: CVE-2024-47943
Vulnrichment
Updated: 2024-10-15T13:26:41.421Z
NVD
Status : Awaiting Analysis
Published: 2024-10-15T09:15:03.357
Modified: 2024-10-15T12:57:46.880
Link: CVE-2024-47943
Redhat
No data.