The devices are vulnerable to session hijacking due to insufficient
entropy in its session ID generation algorithm. The session IDs are
predictable, with only 32,768 possible values per user, which allows
attackers to pre-generate valid session IDs, leading to unauthorized
access to user sessions. This is not only due to the use of an
(insecure) rand() function call but also because of missing
initialization via srand(). As a result only the PIDs are effectively
used as seed.
Advisories

No advisories yet.

Fixes

Solution

The vendor provides a patched version V6.21.00.2 which can be downloaded from the following URL:  www.rittal.com/de-de/products/deep/3124300 https://www.rittal.com/de-de/products/deep/3124300


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 23:30:00 +0000

Type Values Removed Values Added
References

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00138}

epss

{'score': 0.00154}


Mon, 21 Oct 2024 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Rittal
Rittal cmc Iii Processing Units
Rittal cmc Iii Processing Units Firmware
Rittal iot Interface
Rittal iot Interface Firmware
Weaknesses CWE-331
CPEs cpe:2.3:h:rittal:cmc_iii_processing_units:-:*:*:*:*:*:*:*
cpe:2.3:h:rittal:iot_interface:-:*:*:*:*:*:*:*
cpe:2.3:o:rittal:cmc_iii_processing_units_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:rittal:iot_interface_firmware:*:*:*:*:*:*:*:*
Vendors & Products Rittal
Rittal cmc Iii Processing Units
Rittal cmc Iii Processing Units Firmware
Rittal iot Interface
Rittal iot Interface Firmware

Tue, 15 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Rittal Gmbh And Co.kg
Rittal Gmbh And Co.kg iot Interface And Cmc Iii Processing Unit
CPEs cpe:2.3:a:rittal_gmbh_and_co.kg:iot_interface_and_cmc_iii_processing_unit:*:*:*:*:*:*:*:*
Vendors & Products Rittal Gmbh And Co.kg
Rittal Gmbh And Co.kg iot Interface And Cmc Iii Processing Unit
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 15 Oct 2024 10:15:00 +0000

Type Values Removed Values Added
Description The devices are vulnerable to session hijacking due to insufficient entropy in its session ID generation algorithm. The session IDs are predictable, with only 32,768 possible values per user, which allows attackers to pre-generate valid session IDs, leading to unauthorized access to user sessions. This is not only due to the use of an (insecure) rand() function call but also because of missing initialization via srand(). As a result only the PIDs are effectively used as seed.
Title Predictable Session ID
Weaknesses CWE-340
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-11-03T22:21:56.044Z

Reserved: 2024-10-07T13:39:52.543Z

Link: CVE-2024-47945

cve-icon Vulnrichment

Updated: 2025-11-03T22:21:56.044Z

cve-icon NVD

Status : Modified

Published: 2024-10-15T10:15:03.973

Modified: 2025-11-03T23:16:23.623

Link: CVE-2024-47945

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.