the patch files are signed before executing the containing run.sh
script. The signing process is kind of an HMAC with a long string as key
which is hard-coded in the firmware and is freely available for
download. This allows crafting malicious "signed" .patch files in order
to compromise the device and execute arbitrary code.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-42735 | The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh script. The signing process is kind of an HMAC with a long string as key which is hard-coded in the firmware and is freely available for download. This allows crafting malicious "signed" .patch files in order to compromise the device and execute arbitrary code. |
Solution
The vendor provides a patched version V6.21.00.2 which can be downloaded from the following URL: www.rittal.com/de-de/products/deep/3124300 https://www.rittal.com/de-de/products/deep/3124300
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 17 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 15 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 15 Oct 2024 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh script. The signing process is kind of an HMAC with a long string as key which is hard-coded in the firmware and is freely available for download. This allows crafting malicious "signed" .patch files in order to compromise the device and execute arbitrary code. | |
| Title | Improper signature verification of firmware upgrade files | |
| Weaknesses | CWE-347 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-03T22:21:53.100Z
Reserved: 2024-10-07T13:39:52.543Z
Link: CVE-2024-47943
Updated: 2025-11-03T22:21:53.100Z
Status : Awaiting Analysis
Published: 2024-10-15T09:15:03.357
Modified: 2025-11-03T23:16:23.247
Link: CVE-2024-47943
No data.
OpenCVE Enrichment
No data.
EUVD