Cybersecurity researchers have disclosed three safety flaws in Planet Know-how’s WGS-804HPT industrial switches that may very well be chained to realize pre-authentication distant code execution on vulnerable units.
“These switches are broadly utilized in constructing and residential automation techniques for a wide range of networking functions,” Claroty’s Tomer Goldschmidt mentioned in a Thursday report. “An attacker who is ready to remotely management considered one of these units can use them to additional exploit units in an inner community and do lateral motion.”
The operational know-how safety agency, which carried out an in depth evaluation of the firmware utilized in these switches utilizing the QEMU framework, mentioned the vulnerabilities are rooted within the dispatcher.cgi interface used to supply an internet service. The listing of flaws is beneath –
- CVE-2024-52558 (CVSS rating: 5.3) – An integer underflow flaw that may permit an unauthenticated attacker to ship a malformed HTTP request, leading to a crash
- CVE-2024-52320 (CVSS rating: 9.8) – An working system command injection flaw that may permit an unauthenticated attacker to ship instructions via a malicious HTTP request, leading to distant code execution
- CVE-2024-48871 (CVSS rating: 9.8) – A stack-based buffer overflow flaw that may permit an unauthenticated attacker to ship a malicious HTTP request, leading to distant code execution
Profitable exploitation of the failings may allow an attacker to hijack the execution move by embedding a shellcode within the HTTP request and achieve the power to execute working system instructions.
Following accountable disclosure, the Taiwanese firm has rolled out patches for the shortcomings with model 1.305b241111 launched on November 15, 2024.