CVE-2024-33897
Ewon Cosy+ / Talk2M Remote Access Solution Improper Authentication
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A compromised HMS Networks Cosy+ device could be used to request a Certificate Signing Request from Talk2m for another device, resulting in an availability issue. The issue was patched on the Talk2m production server on April 18, 2024.
During account assignment in the Talk2M platform, a Cosy+ device generates and sends a certificate signing request (CSR) to the back end. This CSR is then signed by the manufacturer and used for OpenVPN authentication by the device afterward. Since the common name (CN) of the certificate is specified by the device and used in order to assign the OpenVPN session to the corresponding Talk2M account, an attacker with root access to a Cosy+ device is able to manipulate the CSR and get correctly signed certificates for foreign devices.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-04-28 CVE Reserved
- 2024-08-06 CVE Published
- 2024-08-13 EPSS Updated
- 2024-08-19 First Exploit
- 2024-08-22 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-425: Direct Request ('Forced Browsing')
CAPEC
References (5)
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/180237 | 2024-08-19 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hms-networks Search vendor "Hms-networks" | Ewon Cosy+ Firmware Search vendor "Hms-networks" for product "Ewon Cosy+ Firmware" | * | - |
Affected
| ||||||
Hms-networks Search vendor "Hms-networks" | Ewon Cosy Firmware Search vendor "Hms-networks" for product "Ewon Cosy Firmware" | * | - |
Affected
|