CVE-2024-8455

PLANET Technology switch devices - Swctrl service exchanges weakly encoded passwords

Description

The swctrl service is used to detect and remotely manage PLANET Technology devices. For certain switch models, the authentication tokens used during communication with this service are encoded user passwords. Due to insufficient strength, unauthorized remote attackers who intercept the packets can directly crack them to obtain plaintext passwords.

Remediation

Solution:

  • Update firmware of GS-4210-24PL4C hardware 2.0 to version 2.305b240719 or later. Update firmware of GS-4210-24P2S hardware 3.0 to version 3.305b240802 or later. IGS-5225-4UP1T2S hardware 1.0 has reached End of Life (EOL). Replacement is recommended.

Categories

8.1
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.09%
Third-Party Advisory org.tw Third-Party Advisory org.tw
Affected: PLANET Technology GS-4210-24PL4C hardware 2.0
Affected: PLANET Technology GS-4210-24P2S hardware 3.0
Affected: PLANET Technology IGS-5225-4UP1T2S hardware 1.0
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-8455?
CVE-2024-8455 has been scored as a high severity vulnerability.
How to fix CVE-2024-8455?
To fix CVE-2024-8455: Update firmware of GS-4210-24PL4C hardware 2.0 to version 2.305b240719 or later. Update firmware of GS-4210-24P2S hardware 3.0 to version 3.305b240802 or later. IGS-5225-4UP1T2S hardware 1.0 has reached End of Life (EOL). Replacement is recommended.
Is CVE-2024-8455 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-8455 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-8455?
CVE-2024-8455 affects PLANET Technology GS-4210-24PL4C hardware 2.0, PLANET Technology GS-4210-24P2S hardware 3.0, PLANET Technology IGS-5225-4UP1T2S hardware 1.0.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.