Description
The device directly executes .patch firmware upgrade files on a USB stick without any prior authentication in the admin interface. This leads to an unauthenticated code execution via the firmware upgrade function.
Published: 2024-10-15
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

The vendor provides a patched version V6.21.00.2 which can be downloaded from the following URL:  www.rittal.com/de-de/products/deep/3124300 https://www.rittal.com/de-de/products/deep/3124300

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 03 Nov 2025 23:30:00 +0000

Type Values Removed Values Added
References

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0006}

epss

{'score': 0.00061}


Tue, 15 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 15 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Rittal Gmbh And Co.kg
Rittal Gmbh And Co.kg iot Interface And Cmc Iii Processing Unit
CPEs cpe:2.3:a:rittal_gmbh_and_co.kg:iot_interface_and_cmc_iii_processing_unit:*:*:*:*:*:*:*:*
Vendors & Products Rittal Gmbh And Co.kg
Rittal Gmbh And Co.kg iot Interface And Cmc Iii Processing Unit
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 15 Oct 2024 09:15:00 +0000

Type Values Removed Values Added
Description The device directly executes .patch firmware upgrade files on a USB stick without any prior authentication in the admin interface. This leads to an unauthenticated code execution via the firmware upgrade function.
Title Missing Protection Mechanism for Alternate Hardware Interface
Weaknesses CWE-1299
References

Subscriptions

Rittal Gmbh And Co.kg Iot Interface And Cmc Iii Processing Unit
cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-11-03T22:21:54.572Z

Reserved: 2024-10-07T13:39:52.543Z

Link: CVE-2024-47944

cve-icon Vulnrichment

Updated: 2025-11-03T22:21:54.572Z

cve-icon NVD

Status : Deferred

Published: 2024-10-15T09:15:03.580

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-47944

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses