The device directly executes .patch firmware upgrade files on a USB stick without any prior authentication in the admin interface. This leads to an unauthenticated code execution via the firmware upgrade function.
Solution:
The lack of protections on alternate paths to access control-protected assets (such as unprotected shadow registers and other external facing unguarded interfaces) allows an attacker to bypass existing protections to the asset that are only performed against the primary path.
Link | Tags |
---|---|
https://r.sec-consult.com/rittaliot | third party advisory |
https://www.rittal.com/de-de/products/deep/3124300 | patch |