CVE-2024-41988

Missing Authentication for Critical Function (CWE-306)

Published: Oct 3, 2024 / Updated: 47d ago

010
CVSS 9.3EPSS 0.04%Critical
CVE info copied to clipboard

Summary

TEM Opera Plus FM Family Transmitter allows access to an unprotected endpoint that allows MPFS File System binary image upload without authentication. This file system serves as the basis for the HTTP2 web server module but is also used by the SNMP module and is available to other applications that require basic read-only storage capabilities. This can be exploited to overwrite the flash program memory that holds the web server's main interfaces and execute arbitrary code.

Impact

This vulnerability has a critical severity with a CVSS v4 base score of 9.3. The impact is severe as it allows an attacker to: 1. Upload malicious binary images to the MPFS File System without authentication. 2. Overwrite the flash program memory containing the web server's main interfaces. 3. Execute arbitrary code on the affected system. This can lead to complete compromise of the TEM Opera Plus FM Family Transmitter, potentially allowing an attacker to take full control of the device, manipulate its functionality, and use it as a foothold for further network attacks.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

As of the provided information, there is no mention of an available patch. The security team should immediately check with the vendor (TEM) for any available updates or patches for the Opera Plus FM Family Transmitter.

Mitigation

Until a patch is available, consider the following mitigation strategies: 1. Network Isolation: Restrict network access to the TEM Opera Plus FM Family Transmitter. Only allow connections from trusted IP addresses and networks. 2. Firewall Rules: Implement strict firewall rules to block unauthorized access to the unprotected endpoint. 3. Monitoring: Implement robust logging and monitoring for any suspicious activities or unauthorized access attempts to the device. 4. Regular Audits: Conduct frequent security audits of the device configuration and installed firmware. 5. Least Privilege: Ensure that all user accounts and services associated with the transmitter follow the principle of least privilege. 6. Physical Security: If possible, implement physical security measures to prevent unauthorized access to the device. 7. Backup: Regularly backup the device configuration and critical data to enable quick recovery in case of a compromise. 8. Vendor Communication: Maintain regular contact with TEM for updates on patches or additional mitigation strategies they may recommend.

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Timeline

First Article

Feedly found the first article mentioning CVE-2024-41988. See article

Oct 3, 2024 at 3:20 PM / Cybersecurity and Infrastructure Security Agency CISA
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 3, 2024 at 5:46 PM
CVE Assignment

NVD published the first details for CVE-2024-41988

Oct 3, 2024 at 6:15 PM
CVSS

A CVSS base score of 9.3 has been assigned.

Oct 3, 2024 at 6:20 PM / nvd
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.6%)

Oct 4, 2024 at 9:41 AM
Static CVE Timeline Graph

Attack Patterns

CAPEC-12: Choosing Message Identifier
+null more

News

Splunk Patches Critical Vulnerabilities, Including Remote Code Execution Flaws
Splunk Patches Critical Vulnerabilities, Including Remote Code Execution Flaws Splunk, a leading platform for data analytics and security monitoring, has released a slew of security updates to address multiple vulnerabilities in Splunk Enterprise and Splunk Cloud Platform. These ... Read more Published Date: Oct 15, 2024 (50 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-45741 CVE-2024-45740 CVE-2024-45739 CVE-2024-45738 CVE-2024-45737 CVE-2024-45736 CVE-2024-45735 CVE-2024-45734 CVE-2024-45733 CVE-2024-45732 CVE-2024-45731 CVE-2024-9473 CVE-2024-41988 CVE-2024-41987 CVE-2024-41721 CVE-2024-43917 CVE-2023-40596
Cyble Urges ICS Vulnerability Fixes for TEM, Mitsubishi, and Delta Electronics
Cyble researchers investigated vulnerabilities in five ICS/OT products this week and identified Mitsubishi Electric, TEM, and Delta Electronics products as top priorities for security teams. Cyble’s weekly industrial control system/operational technology (ICS/OT) vulnerability report for Oct. 1-7 investigated 10 vulnerabilities in five ICS/OT products and identified products from Mitsubishi Electric, TEM, and Delta Electronics as top priorities for patching and mitigation.
Multiple vulnerabilities in TEM Opera Plus FM Family Transmitter
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet. The vulnerability allows a remote attacker to bypass authentication process.
CISA reports critical flaws in TEM Opera Plus FM Family transmitter
CISA reports that Telecomunicazioni Elettro Milano (TEM) S.r.l. Opera Plus FM Family Transmitter has multiple vulnerabilities, including a Missing Authentication for Critical Function and Cross-Site Request Forgery (CSRF). Take action: If you are using TEM S.r.l. Opera Plus FM Family Transmitters, make sure they are isolated and accessible only from a trusted network.
CVE-2024-41988
Critical Severity Description TEM Opera Plus FM Family Transmitter allows access to an unprotected endpoint that allows MPFS File System binary image upload without authentication. This file system serves as the basis for the HTTP2 web server module but is also used by the SNMP module and is available to other applications that require basic read-only storage capabilities. This can be exploited to overwrite the flash program memory that holds the web server's main interfaces and execute arbitrary code. Read more at https://www.tenable.com/cve/CVE-2024-41988
See 13 more articles and social media posts

CVSS V3.1

Unknown

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI