Missing Authentication for Critical Function (CWE-306)
Certain switch models from PLANET Technology lack proper access control in firmware upload and download functionality, allowing unauthenticated remote attackers to download and upload firmware and system configurations, ultimately gaining full control of the devices.
This vulnerability allows unauthenticated remote attackers to gain full control of affected PLANET Technology switch models. Attackers can download existing firmware and system configurations, potentially exposing sensitive information. They can also upload malicious firmware or altered configurations, compromising the integrity and functionality of the devices. This can lead to severe impacts on network security, including potential network disruptions, data theft, and use of the compromised switches as a foothold for further attacks within the network.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
As of the current information provided, there is no mention of an available patch. The security team should check with PLANET Technology for any firmware updates or security advisories addressing this vulnerability.
1. Immediately restrict network access to the affected PLANET Technology switch models, especially from untrusted networks. 2. Implement strong network segmentation to isolate these switches from critical systems and the internet. 3. Monitor for any suspicious activities related to firmware updates or configuration changes on these devices. 4. If possible, disable remote firmware upload/download functionality until a patch is available. 5. Regularly backup switch configurations and store them securely off-device. 6. Implement additional authentication mechanisms, such as VPNs or jump hosts, for administrative access to these switches. 7. Keep an eye on PLANET Technology's security advisories for patches and follow their recommended upgrade procedures when available.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Feedly found the first article mentioning CVE-2024-8456. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-8456
A CVSS base score of 9.8 has been assigned.
EPSS Score was set to: 0.09% (Percentile: 39.6%)