Sploit.io - Search

Product: F-CPU 01, version: <= 14.6

CVE-2024-24781

Severity: HIGH

Description: An unauthenticated remote attacker can use an uncontrolled resource consumption vulnerability to DoS the affected devices through excessive traffic on a single ethernet port. 

CVSS Score: 7.5

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000430000
  • Percentile: 0.110490000
  • Date: 2025-01-07

ExploitDB

No data available.

HackerOne Data

  • Rank: 7440
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • HIMA F30 03X YY (COM) - Versions: 0
    • HIMA F30 03X YY (CPU) - Versions: 0
    • HIMA F35 03X YY (COM) - Versions: 0
    • HIMA F35 03X YY (CPU) - Versions: 0
    • HIMA F60 CPU 03X YY (COM) - Versions: 0
    • HIMA F60 CPU 03X YY (CPU) - Versions: 0
    • HIMA F-COM 01 - Versions: 0
    • HIMA F-COM 01 coated - Versions: 0
    • HIMA F-CPU 01 - Versions: 0
    • HIMA F-CPU 01 coated - Versions: 0
    • HIMA X-COM 01 E YY - Versions: 0
    • HIMA X-COM 01 YY - Versions: 0
    • HIMA X-CPU 01 - Versions: 0
    • HIMA X-CPU 31 - Versions: 0
    • HIMA X-SB 01 - Versions: 0

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2024-24781 is a high-severity issue with a CVSS score of 7.5. It involves uncontrolled resource consumption, allowing an unauthenticated remote attacker to cause a denial-of-service (DoS) condition on affected devices by flooding a single Ethernet port with excessive traffic. The nature of this vulnerability lies in its ability to disrupt the availability of critical systems, which could lead to operational downtime, financial losses, and reputational damage.

    The likelihood of exploitation is moderate, given that the attack complexity is low, and no authentication or user interaction is required. The primary impact is on availability, as the vulnerability can render devices unresponsive. There is no direct impact on confidentiality or integrity, but the disruption of services could indirectly affect data processing and system reliability.

    2. Potential Attack Scenarios
    An attacker could exploit this vulnerability by targeting a vulnerable HIMA device connected to a network. The attack vector involves sending a high volume of network traffic to a specific Ethernet port on the device. This traffic overwhelms the device's resources, causing it to become unresponsive or crash.

    For example, an attacker could use a simple script to generate and send a flood of packets to the device's IP address. Since the vulnerability does not require authentication, the attacker can execute this attack remotely without needing prior access to the system. The outcome would be a complete loss of service for the affected device, potentially disrupting critical operations in industrial or manufacturing environments where these devices are commonly used.

    3. Mitigation Recommendations
    Immediate action is required to mitigate this vulnerability. Organizations using affected HIMA devices should apply the latest patches or firmware updates provided by the vendor. If patches are not immediately available, implement network-level controls such as rate limiting or traffic filtering to reduce the risk of exploitation.

    Additionally, organizations should monitor network traffic for unusual patterns that may indicate an attempted attack. Isolating affected devices from untrusted networks or placing them behind firewalls can also help reduce exposure. For further guidance, refer to the vendor advisory at https://cert.vde.com/en/advisories/VDE-2024-013.

    4. Executive Summary
    CVE-2024-24781 is a high-severity vulnerability affecting multiple HIMA devices, allowing unauthenticated attackers to cause a denial-of-service condition by overwhelming a device's Ethernet port with excessive traffic. This could lead to significant operational disruptions, financial losses, and reputational harm.

    The vulnerability is relatively easy to exploit, and while it does not directly compromise data confidentiality or integrity, the impact on availability is severe. Immediate action is recommended, including applying vendor patches, implementing network controls, and monitoring for suspicious activity. Addressing this vulnerability is critical to maintaining operational continuity and safeguarding critical infrastructure.

    CVE-2024-24782

    Severity: MEDIUM

    Description: An unauthenticated attacker can send a ping request from one network to another through an error in the origin verification even though the ports are separated by VLAN.

    CVSS Score: 4.3

    Priority

    D

    CISA Data

    EPSS Data

    • EPSS: 0.000430000
    • Percentile: 0.110490000
    • Date: 2025-01-07

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 7440
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • HIMA F30 03X YY (COM) - Versions: 0
      • HIMA F30 03X YY (CPU) - Versions: 0
      • HIMA F35 03X YY (COM) - Versions: 0
      • HIMA F35 03X YY (CPU) - Versions: 0
      • HIMA F60 CPU 03X YY (COM) - Versions: 0
      • HIMA F60 CPU 03X YY (CPU) - Versions: 0
      • HIMA F-COM 01 - Versions: 0
      • HIMA F-COM 01 coated - Versions: 0
      • HIMA F-CPU 01 - Versions: 0
      • HIMA F-CPU 01 coated - Versions: 0
      • HIMA X-COM 01 E YY - Versions: 0
      • HIMA X-COM 01 YY - Versions: 0
      • HIMA X-CPU 01 - Versions: 0
      • HIMA X-CPU 31 - Versions: 0

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability identified as CVE-2024-24782 is a medium-severity issue with a CVSS score of 4.3. It stems from an origin validation error in multiple HIMA products, allowing an unauthenticated attacker to send ping requests across VLAN-separated networks. This flaw could lead to unauthorized information disclosure, as the attacker could potentially gather network topology or other sensitive data. The attack complexity is low, and no user interaction or privileges are required, making exploitation relatively straightforward for an attacker with adjacent network access.

      The primary impact is on confidentiality, as the vulnerability could expose limited information about the network. There is no direct impact on integrity or availability, as the flaw does not allow for data modification or service disruption. However, the exposure of network details could facilitate further attacks. The likelihood of exploitation is moderate, given the low complexity and the fact that the attack vector is adjacent network-based. Organizations using affected HIMA products should prioritize addressing this issue to prevent potential reconnaissance activities.

      2. Potential Attack Scenarios
      An attacker with access to an adjacent network could exploit this vulnerability to conduct network reconnaissance. For example, in an industrial control system (ICS) environment where HIMA devices are deployed, an attacker could connect to a compromised network segment and send ping requests to devices on another VLAN. This would bypass the intended VLAN separation due to the origin verification error.

      The attack process would involve the attacker crafting and sending specially designed ping requests to the target network. If successful, the attacker could receive responses from devices that should be isolated, revealing their presence and potentially their IP addresses. This information could then be used to map the network or plan further attacks. The outcome of such an attack would be the unauthorized disclosure of network information, which could compromise the security posture of the organization.

      3. Mitigation Recommendations
      To mitigate this vulnerability, organizations should immediately apply patches or updates provided by HIMA for the affected products. If patches are not yet available, implement network-level controls to restrict access to the affected devices. For example, configure firewalls or access control lists (ACLs) to block unauthorized ping requests between VLANs.

      Additionally, organizations should monitor network traffic for unusual ping activity, which could indicate an attempted exploit. Regularly review and update VLAN configurations to ensure proper isolation of sensitive network segments. For further guidance, refer to the advisory published by CERT@VDE at https://cert.vde.com/en/advisories/VDE-2024-013.

      4. Executive Summary
      CVE-2024-24782 is a medium-severity vulnerability affecting multiple HIMA products, allowing unauthenticated attackers to send ping requests across VLAN-separated networks. This flaw could lead to unauthorized information disclosure, potentially exposing network details that could be used for further attacks. While the impact is limited to confidentiality, the ease of exploitation and the potential for reconnaissance make this a significant risk.

      Organizations using affected HIMA products should prioritize applying patches or updates and implement network-level controls to mitigate the risk. Immediate action is recommended to prevent potential exploitation and protect sensitive network information. Addressing this vulnerability is critical to maintaining the security and integrity of industrial control systems and other environments where these devices are deployed.