CVE-2024-45274

Missing Authentication for Critical Function (CWE-306)

Published: Oct 15, 2024 / Updated: 35d ago

010
CVSS 9.8EPSS 0.09%Critical
CVE info copied to clipboard

Summary

An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication.

Impact

This vulnerability allows an attacker to execute operating system commands remotely without any authentication. The impact is severe, with high risks to confidentiality, integrity, and availability of the affected system. An attacker could potentially gain full control over the device, access sensitive information, modify system configurations, or disrupt services.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

Based on the provided information, there is no mention of an available patch.

Mitigation

While no specific mitigation is mentioned in the provided data, general recommendations would include: 1. Implement strong authentication mechanisms for all critical functions, especially those accessible via network protocols like UDP. 2. Apply network segmentation to limit access to affected devices. 3. Monitor for suspicious UDP traffic or unexpected command executions. 4. Keep systems and software up-to-date with the latest security patches when they become available.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

First Article

Feedly found the first article mentioning CVE-2024-45274. See article

Oct 15, 2024 at 10:37 AM / CVE
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 15, 2024 at 10:38 AM
CVE Assignment

NVD published the first details for CVE-2024-45274

Oct 15, 2024 at 11:15 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Oct 15, 2024 at 11:20 AM / nvd
EPSS

EPSS Score was set to: 0.09% (Percentile: 39.8%)

Oct 16, 2024 at 9:57 AM
Static CVE Timeline Graph

Affected Systems

Helmholz/rex_100_firmware
+null more

Attack Patterns

CAPEC-12: Choosing Message Identifier
+null more

News

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28
Evasive Panda Uses New Tool for Exfiltrating Cloud Data: The China-linked threat actor known as Evasive Panda infected a government entity and a religious organization in Taiwan with a new post-compromise toolset codenamed CloudScout that allows for stealing data from Google Drive, Gmail, and Outlook. Security Flaws Fixed in AC charging controllers: Cybersecurity researchers have discovered multiple security shortcomings in the firmware of Phoenix Contact CHARX SEC-3100 AC charging controllers that could allow a remote unauthenticated attacker to reset the user-app account’s password to the default value, upload arbitrary script files, escalate privileges, and execute arbitrary code in the context of root.
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03)
Evasive Panda Uses New Tool for Exfiltrating Cloud Data: The China-linked threat actor known as Evasive Panda infected a government entity and a religious organization in Taiwan with a new post-compromise toolset codenamed CloudScout that allows for stealing data from Google Drive, Gmail, and Outlook. Security Flaws Fixed in AC charging controllers: Cybersecurity researchers have discovered multiple security shortcomings in the firmware of Phoenix Contact CHARX SEC-3100 AC charging controllers that could allow a remote unauthenticated attacker to reset the user-app account's password to the default value, upload arbitrary script files, escalate privileges, and execute arbitrary code in the context of root.
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03)
Evasive Panda Uses New Tool for Exfiltrating Cloud Data: The China-linked threat actor known as Evasive Panda infected a government entity and a religious organization in Taiwan with a new post-compromise toolset codenamed CloudScout that allows for stealing data from Google Drive, Gmail, and Outlook. Security Flaws Fixed in AC charging controllers: Cybersecurity researchers have discovered multiple security shortcomings in the firmware of Phoenix Contact CHARX SEC-3100 AC charging controllers that could allow a remote unauthenticated attacker to reset the user-app account's password to the default value, upload arbitrary script files, escalate privileges, and execute arbitrary code in the context of root.
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 – Nov 03)
Evasive Panda Uses New Tool for Exfiltrating Cloud Data: The China-linked threat actor known as Evasive Panda infected a government entity and a religious organization in Taiwan with a new post-compromise toolset codenamed CloudScout that allows for stealing data from Google Drive, Gmail, and Outlook. “The threat actors used multiple well-known vulnerabilities to infect a wide variety of websites and stage fake product listings that rose to the top of search results,” HUMAN said .
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 – Nov 03)
Evasive Panda Uses New Tool for Exfiltrating Cloud Data: The China-linked threat actor known as Evasive Panda infected a government entity and a religious organization in Taiwan with a new post-compromise toolset codenamed CloudScout that allows for stealing data from Google Drive, Gmail, and Outlook. Security Flaws Fixed in AC charging controllers: Cybersecurity researchers have discovered multiple security shortcomings in the firmware of Phoenix Contact CHARX SEC-3100 AC charging controllers that could allow a remote unauthenticated attacker to reset the user-app account’s password to the default value, upload arbitrary script files, escalate privileges, and execute arbitrary code in the context of root.
See 16 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI