CVE-2024-47945

Severity CVSS v4.0:
Pending analysis
Type:
CWE-331 Insufficient Entropy
Publication date:
15/10/2024
Last modified:
21/10/2024

Description

The devices are vulnerable to session hijacking due to insufficient <br /> entropy in its session ID generation algorithm. The session IDs are <br /> predictable, with only 32,768 possible values per user, which allows <br /> attackers to pre-generate valid session IDs, leading to unauthorized <br /> access to user sessions. This is not only due to the use of an <br /> (insecure) rand() function call but also because of missing <br /> initialization via srand(). As a result only the PIDs are effectively <br /> used as seed.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:rittal:iot_interface_firmware:*:*:*:*:*:*:*:* 6.21.00.2 (excluding)
cpe:2.3:h:rittal:iot_interface:-:*:*:*:*:*:*:*
cpe:2.3:o:rittal:cmc_iii_processing_units_firmware:*:*:*:*:*:*:*:* 6.21.00.2 (excluding)
cpe:2.3:h:rittal:cmc_iii_processing_units:-:*:*:*:*:*:*:*