Cybersecurity researchers have disclosed three safety flaws in Planet Know-how’s WGS-804HPT industrial switches that might be chained to realize pre-authentication distant code execution on vulnerable gadgets.
“These switches are broadly utilized in constructing and residential automation techniques for a wide range of networking functions,” Claroty’s Tomer Goldschmidt stated in a Thursday report. “An attacker who is ready to remotely management one among these gadgets can use them to additional exploit gadgets in an inside community and do lateral motion.”
The operational know-how safety agency, which carried out an intensive evaluation of the firmware utilized in these switches utilizing the QEMU framework, stated the vulnerabilities are rooted within the dispatcher.cgi interface used to offer an internet service. The checklist of flaws is beneath –
- CVE-2024-52558 (CVSS rating: 5.3) – An integer underflow flaw that may enable an unauthenticated attacker to ship a malformed HTTP request, leading to a crash
- CVE-2024-52320 (CVSS rating: 9.8) – An working system command injection flaw that may enable an unauthenticated attacker to ship instructions via a malicious HTTP request, leading to distant code execution
- CVE-2024-48871 (CVSS rating: 9.8) – A stack-based buffer overflow flaw that may enable an unauthenticated attacker to ship a malicious HTTP request, leading to distant code execution
Profitable exploitation of the failings might allow an attacker to hijack the execution stream by embedding a shellcode within the HTTP request and acquire the flexibility to execute working system instructions.
Following accountable disclosure, the Taiwanese firm has rolled out patches for the shortcomings with model 1.305b241111 launched on November 15, 2024.