CVE-2024-47943
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/10/2024
Last modified:
17/03/2025
Description
The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if <br />
the patch files are signed before executing the containing run.sh <br />
script. The signing process is kind of an HMAC with a long string as key<br />
which is hard-coded in the firmware and is freely available for <br />
download. This allows crafting malicious "signed" .patch files in order <br />
to compromise the device and execute arbitrary code.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL