The device directly executes .patch firmware upgrade files on a USB stick without any prior authentication in the admin interface. This leads to an unauthenticated code execution via the firmware upgrade function.
Fixes

Solution

The vendor provides a patched version V6.21.00.2 which can be downloaded from the following URL:  www.rittal.com/de-de/products/deep/3124300 https://www.rittal.com/de-de/products/deep/3124300


Workaround

No workaround given by the vendor.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0006}

epss

{'score': 0.00061}


Tue, 15 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 15 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Rittal Gmbh And Co.kg
Rittal Gmbh And Co.kg iot Interface And Cmc Iii Processing Unit
CPEs cpe:2.3:a:rittal_gmbh_and_co.kg:iot_interface_and_cmc_iii_processing_unit:*:*:*:*:*:*:*:*
Vendors & Products Rittal Gmbh And Co.kg
Rittal Gmbh And Co.kg iot Interface And Cmc Iii Processing Unit
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 15 Oct 2024 09:15:00 +0000

Type Values Removed Values Added
Description The device directly executes .patch firmware upgrade files on a USB stick without any prior authentication in the admin interface. This leads to an unauthenticated code execution via the firmware upgrade function.
Title Missing Protection Mechanism for Alternate Hardware Interface
Weaknesses CWE-1299
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2024-10-15T15:45:06.397Z

Reserved: 2024-10-07T13:39:52.543Z

Link: CVE-2024-47944

cve-icon Vulnrichment

Updated: 2024-10-15T13:22:34.144Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-15T09:15:03.580

Modified: 2024-10-15T16:35:09.410

Link: CVE-2024-47944

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.