The Skylab IGX IIoT Gateway allowed users to connect to it via a limited shell terminal (IGX). However, it was discovered that the process was running under root privileges. This allowed the attacker to read, write, and modify any file in the operating system by utilizing the limited shell file exec and download functions. By replacing the /etc/passwd file with a new root user entry, the attacker was able to breakout from the limited shell and login to a unrestricted shell with root access. With the root access, the attacker will be able take full control of the IIoT Gateway.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GovTech CSG

Published: 2024-04-26T02:26:22.758Z

Updated: 2024-08-01T20:33:52.410Z

Reserved: 2024-04-25T02:38:12.253Z

Link: CVE-2024-4163

cve-icon Vulnrichment

Updated: 2024-08-01T20:33:52.410Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-26T03:15:06.740

Modified: 2024-07-03T02:07:10.047

Link: CVE-2024-4163

cve-icon Redhat

No data.