CVE-2024-47943

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/10/2024
Last modified:
17/03/2025

Description

The firmware upgrade function in the admin web interface of the Rittal IoT Interface &amp; CMC III Processing Unit devices checks if <br /> the patch files are signed before executing the containing run.sh <br /> script. The signing process is kind of an HMAC with a long string as key<br /> which is hard-coded in the firmware and is freely available for <br /> download. This allows crafting malicious "signed" .patch files in order <br /> to compromise the device and execute arbitrary code.