漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Improper signature verification of firmware upgrade files
Vulnerability Description
The firmware upgrade function in the admin web interface of the Rittal IoT Interface & CMC III Processing Unit devices checks if the patch files are signed before executing the containing run.sh script. The signing process is kind of an HMAC with a long string as key which is hard-coded in the firmware and is freely available for download. This allows crafting malicious "signed" .patch files in order to compromise the device and execute arbitrary code.
CVSS Information
N/A
Vulnerability Type
密码学签名的验证不恰当
Vulnerability Title
Rittal IoT Interface & CMC III Processing Unit 安全漏洞
Vulnerability Description
Rittal IoT Interface & CMC III Processing Unit是德国Rittal公司的一个用于监控物理环境条件的传感器智能联网的关键组件。 Rittal IoT Interface & CMC III Processing Unit 6.21.00.2之前版本存在安全漏洞,该漏洞源于固件升级功能未对补丁文件进行签名验证,攻击者可以制作恶意的签名.patch 文件,以破坏设备并执行任意代码。
CVSS Information
N/A
Vulnerability Type
N/A