Rittal IoT Interface / CMC III Processing Unit Signature Verification / Session ID ≈ Packet Storm

Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]

Rittal IoT Interface / CMC III Processing Unit Signature Verification / Session ID[6]
Authored by Johannes Kruchem[7] | Site sec-consult.com[8]

Rittal IoT Interface and CMC III Processing Unit versions prior to 6.21.00.2 suffer from improper signature verification and predictable session identifier vulnerabilities.

advisories | CVE-2024-47943[9], CVE-2024-47944[10], CVE-2024-47945[11]
SHA-256 | 24d8219a6f5e71cab30605ff318d56d4c733756ce0d70e61bb19f0186edec9fd

Login[15] or Register[16] to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa

File Tags

File Archives

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services[121]
Hosting By
Rokasec[122]
close
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"