CVE-2024-4163

Privilege Escalation on Skylab IIoT Gateway (IGX)

Description

The Skylab IGX IIoT Gateway allowed users to connect to it via a limited shell terminal (IGX). However, it was discovered that the process was running under root privileges. This allowed the attacker to read, write, and modify any file in the operating system by utilizing the limited shell file exec and download functions. By replacing the /etc/passwd file with a new root user entry, the attacker was able to breakout from the limited shell and login to a unrestricted shell with root access. With the root access, the attacker will be able take full control of the IIoT Gateway.

Category

8.0
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.06%
Affected: Skylab IIoT Gateway (IGX)
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-4163?
CVE-2024-4163 has been scored as a high severity vulnerability.
How to fix CVE-2024-4163?
To fix CVE-2024-4163, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-4163 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-4163 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-4163?
CVE-2024-4163 affects Skylab IIoT Gateway (IGX).
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.