Description

The firmware upgrade function in the admin web interface of the RittalĀ IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh script. The signing process is kind of an HMAC with a long string as key which is hard-coded in the firmware and is freely available for download. This allows crafting malicious "signed" .patch files in order to compromise the device and execute arbitrary code.

INFO

Published Date :

2024-10-15T08:57:05.068Z

Last Modified :

2025-11-03T22:21:53.100Z

Source :

SEC-VLab
AFFECTED PRODUCTS

The following products are affected by CVE-2024-47943 vulnerability.

No data.

REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-47943.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact