CVE-2024-10381

Authentication Bypass Using an Alternate Path or Channel (CWE-288)

Published: Oct 25, 2024 / Updated: 25d ago

010
CVSS 9.3EPSS 0.04%Critical
CVE info copied to clipboard

Summary

A vulnerability exists in Matrix Door Controller Cosec Vega FAXQ due to improper implementation of session management at the web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable device.

Impact

Successful exploitation of this vulnerability could allow a remote attacker to gain unauthorized access and take complete control of the targeted device. This includes potential impacts on the confidentiality, integrity, and availability of the system, all rated as HIGH. The CVSS v3.1 base score is 9.8 (CRITICAL), indicating severe consequences. The attack vector is NETWORK, attack complexity is LOW, and no user interaction is required, making it easily exploitable. There may also be LOW impacts on subsequent systems' confidentiality, integrity, and availability.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is not currently available for this vulnerability. The vulnerability affects Matrix Door Controller Cosec Vega FAXQ firmware versions prior to v2r17.

Mitigation

While specific mitigation steps are not provided, general recommendations include: 1. Implement strong access controls and authentication mechanisms for the web-based management interface. 2. Use network segmentation to limit access to the Matrix Door Controller Cosec Vega FAXQ devices. 3. Monitor and log all access attempts to these devices. 4. Apply any security updates or patches as soon as they become available from the vendor. 5. Consider using a web application firewall (WAF) to help protect against malicious HTTP requests. 6. If possible, disable or restrict access to the web-based management interface until a patch is available.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Timeline

CVE Assignment

NVD published the first details for CVE-2024-10381

Oct 25, 2024 at 1:15 PM
CVSS

A CVSS base score of 9.3 has been assigned.

Oct 25, 2024 at 1:20 PM / nvd
First Article

Feedly found the first article mentioning CVE-2024-10381. See article

Oct 25, 2024 at 1:21 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 25, 2024 at 1:21 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.8%)

Oct 26, 2024 at 9:52 AM
Static CVE Timeline Graph

Affected Systems

Matrixcomsec/cosec_vega_faxq_firmware
+null more

Links to Mitre Att&cks

T1083: File and Directory Discovery
+null more

Attack Patterns

CAPEC-127: Directory Indexing
+null more

News

Data Breach Risk: Update Your Philips Smart Lights and Matrix Door Controller Firmware Immediately
Owners of these devices are advised to update their firmware to version 1.33.1 or higher to safeguard against potential breaches. India’s CERT-In has issued two alerts concerning critical vulnerabilities in popular smart devices—specifically, Philips Smart Lighting products and the Matrix Door Controller access control system.
cveNotify : 🚨 CVE-2024-10381This vulnerability exists in Matrix Door Controller Cosec Vega FAXQ due to improper implementation of session management at the web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http request on the vulnerable device.Successful exploitation of this vulnerability could allow remote attacker to gain unauthorized access and take complete control of the targeted device.🎖@cveNotify
cveNotify : 🚨 CVE-2024-10381This vulnerability exists in Matrix Door Controller Cosec Vega FAXQ due to improper implementation of session management at the web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http request on the vulnerable device.Successful exploitation of this vulnerability could allow remote attacker to gain unauthorized access and take complete control of the targeted device.🎖@cveNotify
NA - CVE-2024-10381 - This vulnerability exists in Matrix Door...
This vulnerability exists in Matrix Door Controller Cosec Vega FAXQ due to improper implementation of session management at the web-based management interface. A remote attacker could exploit this...
CVE-2024-10381 | Matrix Comsec Matrix Door Controller Cosec Vega FAXQ V2R16 Web-based Management Interface authentication bypass (CIVN-2024-0328)
A vulnerability has been found in Matrix Comsec Matrix Door Controller Cosec Vega FAXQ V2R16 and classified as very critical . Affected by this vulnerability is an unknown functionality of the component Web-based Management Interface . The manipulation leads to authentication bypass using alternate channel. This vulnerability is known as CVE-2024-10381 . The attack can be launched remotely. There is no exploit available. It is recommended to upgrade the affected component.
CVE-2024-10381 - Matrix Door Controller Cosec Vega FAXQ Web Session Management Remote Command Execution
CVE ID : CVE-2024-10381 Published : Oct. 25, 2024, 1:15 p.m. 20 minutes ago Description : This vulnerability exists in Matrix Door Controller Cosec Vega FAXQ due to improper implementation of session management at the web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http request on the vulnerable device. Successful exploitation of this vulnerability could allow remote attacker to gain unauthorized access and take complete control of the targeted device. Severity:
See 5 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI