Critical Flaw in RAISECOM Gateways Actively Exploited, Exposing Thousands to Remote Attacks
A newly discovered and actively exploited vulnerability in RAISECOM Gateway devices poses a significant threat to enterprise security. The flaw, tracked as CVE-2024-7120 with a critical CVSS score of 9.8, allows remote attackers to execute arbitrary commands on affected devices, potentially leading to unauthorized access, data breaches, and system compromise.
The command injection vulnerability resides within the list_base_config.php script of the web interface, impacting RAISECOM Gateway models MSG1200, MSG2100E, MSG2200, and MSG2300 running software version 3.90. Security researchers have confirmed the ease of exploitation, with proof-of-concept code readily available.
Threat actors are actively leveraging this vulnerability, with attacks observed since early September, peaking around September 12th-13th.
Security expert Johannes B. Ullrich, Ph.D., Dean of Research, has identified two distinct payloads used in the attacks. These payloads, designed to download and execute malware, show evidence of regular botnets scanning for and compromising vulnerable routers.
First payload:
Second payload (using TFTP instead of HTTP):
While RAISECOM has yet to release a patch, immediate action is crucial to mitigate the risk:
- Restrict Access: Limit access to the device’s web interface to trusted networks and authorized personnel only.
- Input Validation: Implement stringent input validation and sanitization procedures on the web interface to prevent malicious code injection.
- Network Monitoring: Employ robust network monitoring and intrusion detection systems to identify and respond to any suspicious activity.
Related Posts:
- RAISECOM Gateways Exposed: Remote Command Execution Flaw Impacts 25,000+ Devices
- Trend Micro Linux-based Email Encryption Gateway exist multiple security vulnerabilities
- Critical Citrix Vulnerabilities Expose Sensitive Data, Cause DoS
- Critical Vulnerabilities Discovered in Ivanti Connect Secure and Policy Secure
- CISA Warns of Actively Exploited Linux Kernel and Check Point Gateway Vulnerabilities