Summary
Multiple vulnerabilities have been discovered in REX100 allowing for RCE or unauthorized file access.
Impact
CVE-2024-45271, CVE-2024-45274 and CVE-2024-45275 allow remote code execution with system privileges, resulting in full compromise of the device.
CVE-2024-45273 allows undetectable tampering and manipulation of encrypted configuration files.
CVE-2024-45276 allows unauthenticated access to potential sensitive files.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
Helmholz REX100 | Firmware <=2.2.13 |
Vulnerabilities
Expand / Collapse allThe devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices.
An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication.
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.
An unauthenticated remote attacker can get read access to files in the "/tmp" directory due to missing authentication.
Remediation
Update REX100 to the version 2.3.1
Revision History
Version | Date | Summary |
---|---|---|
1.0.0 | 15.10.2024 10:00 | Initial revision. |
1.0.1 | 06.11.2024 12:27 | Fix: correct certvde domain, added self-reference |
1.0.2 | 12.03.2025 14:30 | removed spaces around version operators |
1.1.2 | 27.08.2025 12:00 | Update: CWE from CVE-2024-45271, Revision History |