Critical Security Flaws in Planet Technology's Industrial Switches Disclosed

Cybersecurity researchers have identified three significant security vulnerabilities in Planet Technology’s WGS-804HPT industrial switches, which could be exploited to achieve pre-authentication remote code execution. These switches are extensively deployed in building and home automation systems, serving various networking applications.

According to Tomer Goldschmidt from Claroty, an operational technology (OT) security firm, the potential impact of these vulnerabilities is considerable. “An attacker who is able to remotely control one of these devices can use them to further exploit devices in an internal network and perform lateral movement,” Goldschmidt explained in a report published on Thursday.

Vulnerabilities Rooted in Firmware

Claroty conducted a comprehensive analysis of the firmware utilized by these switches using the QEMU framework. The analysis revealed that the vulnerabilities stem from issues in the dispatcher.cgi interface, which is responsible for providing web services on the devices. The identified flaws are as follows:

  1. CVE-2024-52558 (CVSS score: 5.3): An integer underflow vulnerability that could enable an unauthenticated attacker to send a malformed HTTP request, leading to a system crash.
  2. CVE-2024-52320 (CVSS score: 9.8): A critical operating system command injection flaw that could allow an unauthenticated attacker to send malicious HTTP requests, resulting in remote code execution.
  3. CVE-2024-48871 (CVSS score: 9.8): A stack-based buffer overflow vulnerability that could permit an unauthenticated attacker to send a crafted HTTP request, leading to remote code execution.

Exploitation and Impact

The successful exploitation of these vulnerabilities could allow attackers to manipulate the execution flow of the device. By embedding shellcode into malicious HTTP requests, attackers could gain the ability to execute operating system commands remotely. This capability not only compromises the targeted device but also poses a threat to other devices within the same internal network, potentially enabling lateral movement and broader network infiltration.

Recommendations

Organizations utilizing Planet Technology’s WGS-804HPT switches are strongly advised to:

  • Apply firmware updates as soon as they become available to mitigate these vulnerabilities.
  • Segment industrial devices from other parts of the network to limit potential attack vectors.
  • Monitor network traffic for unusual activity that might indicate exploitation attempts.
  • Use intrusion detection and prevention systems to identify and block malicious HTTP requests.

By addressing these security flaws, organizations can significantly reduce the risk of exploitation and protect their critical infrastructure from potential threats.


Similar Articles
Image Description
Vulnerability Severe Apache HTTP Server Flaws Put Millions of Websites at Risk of Cyber Attacks

Apache HTTP Server is one of the most popular web server software solutions globally, powering a significant portion of websites on the inter ...

  • By DragonX Team

  • Updated Jul 22, 2024

Cybersecurity researchers have identified three significant security vulnerabilities in Planet Technology’s WGS-804HPT industrial switches, which could be exploited to achieve pre-authentication remote code execution. These switches are extensively deployed in building and home automation systems, serving various networking applications.

According to Tomer Goldschmidt from Claroty, an operational technology (OT) security firm, the potential impact of these vulnerabilities is considerable. “An attacker who is able to remotely control one of these devices can use them to further exploit devices in an internal network and perform lateral movement,” Goldschmidt explained in a report published on Thursday.

Vulnerabilities Rooted in Firmware

Claroty conducted a comprehensive analysis of the firmware utilized by these switches using the QEMU framework. The analysis revealed that the vulnerabilities stem from issues in the dispatcher.cgi interface, which is responsible for providing web services on the devices. The identified flaws are as follows:

  1. CVE-2024-52558 (CVSS score: 5.3): An integer underflow vulnerability that could enable an unauthenticated attacker to send a malformed HTTP request, leading to a system crash.
  2. CVE-2024-52320 (CVSS score: 9.8): A critical operating system command injection flaw that could allow an unauthenticated attacker to send malicious HTTP requests, resulting in remote code execution.
  3. CVE-2024-48871 (CVSS score: 9.8): A stack-based buffer overflow vulnerability that could permit an unauthenticated attacker to send a crafted HTTP request, leading to remote code execution.

Exploitation and Impact

The successful exploitation of these vulnerabilities could allow attackers to manipulate the execution flow of the device. By embedding shellcode into malicious HTTP requests, attackers could gain the ability to execute operating system commands remotely. This capability not only compromises the targeted device but also poses a threat to other devices within the same internal network, potentially enabling lateral movement and broader network infiltration.

Recommendations

Organizations utilizing Planet Technology’s WGS-804HPT switches are strongly advised to:

  • Apply firmware updates as soon as they become available to mitigate these vulnerabilities.
  • Segment industrial devices from other parts of the network to limit potential attack vectors.
  • Monitor network traffic for unusual activity that might indicate exploitation attempts.
  • Use intrusion detection and prevention systems to identify and block malicious HTTP requests.

By addressing these security flaws, organizations can significantly reduce the risk of exploitation and protect their critical infrastructure from potential threats.


Similar Articles
Image Description
Vulnerability Management Latest QR Code Phishing Attack Uses Microsoft Sway to Steal Login Credentials

Discover how the latest QR code phishing attack leverages Microsoft Sway to steal login credentials, and learn how to protect yourself from t ...

  • By DragonX Team

  • Updated Sep 17, 2024



Latest News and Updates

Latest News

  • Android's New Identity Check Feature Locks Device Settings Outside Trusted Locations

    1

    Posted Date Jan 25, 2025

    Android's New Identity...

    Google has launched a new...
  • DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations

    2

    Posted Date Jan 25, 2025

    DoJ Indicts 5...

    The U.S. Department of Justice...
  • RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations

    3

    Posted Date Jan 25, 2025

    RANsacked: Over 100...

    A group of academics has...
  • Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks

    4

    Posted Date Jan 24, 2025

    Beware: Fake CAPTCHA...

    Cybersecurity researchers are calling attention...
  • Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits

    5

    Posted Date Jan 24, 2025

    Palo Alto Firewalls...

    An exhaustive evaluation of three...
X
DragonX Cookie Policy

At DragonX, we employ cookies on our website to enhance the site, providing the best service and customer experience possible

Category

Necessary (Always active)

These cookies enable essential site features like secure log-in and consent preference adjustments, without storing any personally identifiable data

Functional

This category aids in specific functions such as sharing website content on social media platforms, receiving feedback, and incorporating third-party features

Analytics

Analytical cookies are utilized to comprehend visitor interactions on the website, offering insights into metrics like visitor numbers, bounce rates, and traffic sources

Performance

These cookies help in understanding and analyzing important performance indicators of the website to enhance the user experience

Advertisement

Tailored advertisements are provided to visitors based on previously visited pages, while also evaluating the effectiveness of ad campaigns