CVE-2024-47945
Severity CVSS v4.0:
Pending analysis
Type:
CWE-331
Insufficient Entropy
Publication date:
15/10/2024
Last modified:
21/10/2024
Description
The devices are vulnerable to session hijacking due to insufficient <br />
entropy in its session ID generation algorithm. The session IDs are <br />
predictable, with only 32,768 possible values per user, which allows <br />
attackers to pre-generate valid session IDs, leading to unauthorized <br />
access to user sessions. This is not only due to the use of an <br />
(insecure) rand() function call but also because of missing <br />
initialization via srand(). As a result only the PIDs are effectively <br />
used as seed.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:rittal:iot_interface_firmware:*:*:*:*:*:*:*:* | 6.21.00.2 (excluding) | |
cpe:2.3:h:rittal:iot_interface:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:rittal:cmc_iii_processing_units_firmware:*:*:*:*:*:*:*:* | 6.21.00.2 (excluding) | |
cpe:2.3:h:rittal:cmc_iii_processing_units:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page