The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if
the patch files are signed before executing the containing run.sh
script. The signing process is kind of an HMAC with a long string as key
which is hard-coded in the firmware and is freely available for
download. This allows crafting malicious "signed" .patch files in order
to compromise the device and execute arbitrary code.
Metrics
Affected Vendors & Products
References
History
Mon, 17 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 15 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Oct 2024 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh script. The signing process is kind of an HMAC with a long string as key which is hard-coded in the firmware and is freely available for download. This allows crafting malicious "signed" .patch files in order to compromise the device and execute arbitrary code. | |
Title | Improper signature verification of firmware upgrade files | |
Weaknesses | CWE-347 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-03-17T15:21:48.883Z
Reserved: 2024-10-07T13:39:52.543Z
Link: CVE-2024-47943

Updated: 2024-10-15T13:26:41.421Z

Status : Awaiting Analysis
Published: 2024-10-15T09:15:03.357
Modified: 2025-03-17T16:15:23.143
Link: CVE-2024-47943

No data.