vendor:
TimeProvider 4100
by:
Armando Huesca Prida
6.1
CVSS
HIGH
Remote Code Execution (RCE)
78
CWE
Product Name: TimeProvider 4100
Affected Version From: Firmware release 1.0
Affected Version To: Firmware release 2.4.7
Patch Exists: NO
Related CWE: CVE-2024-9054
CPE: h:microchip:timeprovider_4100:2.4.6
Platforms Tested:
2024
Microchip TimeProvider 4100 (Configuration modules) 2.4.6 – OS Command Injection
A vulnerability exists in the 'secret_key' XML tag in Microchip TimeProvider 4100's configuration file, allowing remote code execution. By injecting a malicious payload into the configuration file and triggering it during login, an attacker can execute arbitrary OS commands remotely.
Mitigation:
To mitigate this vulnerability, it is recommended to restrict access to the configuration files and ensure that they are not tampered with. Additionally, regular security audits and monitoring of the device's behavior can help in detecting any unauthorized changes.