CVE-2020-11953

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code on affected Rittal PDU and CMCIII devices through OS command injection. Organizations using Rittal power distribution units and monitoring systems with vulnerable firmware versions are at risk.

💻 Affected Systems

Products:
  • Rittal PDU-3C002DEC
  • Rittal CMCIII-PU-9333E0FB
Versions: PDU-3C002DEC through 5.15.40, CMCIII-PU-9333E0FB through 3.15.70_4
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Multiple Rittal products based on the same underlying software are likely affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to disrupt power management, manipulate environmental controls, and pivot to other network systems.

🟠

Likely Case

Unauthorized access to power management systems leading to operational disruption, data exfiltration, or ransomware deployment.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH - These devices are often exposed to manage remote infrastructure.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit if devices are accessible on the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory includes technical details that could be used to develop exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PDU-3C002DEC > 5.15.40, CMCIII-PU-9333E0FB > 3.15.70_4

Vendor Advisory: https://www.rittal.com/security-advisory

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Download latest firmware from Rittal support portal. 3. Apply firmware update following vendor instructions. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices in separate VLAN with strict firewall rules.

Access Control

all

Restrict network access to management interfaces using IP whitelisting.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate devices from untrusted networks
  • Deploy intrusion detection systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via device web interface or CLI: show version

Check Version:

show version (via CLI) or check web interface system info

Verify Fix Applied:

Confirm firmware version is above vulnerable ranges and test command injection vectors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns
  • Multiple failed authentication attempts
  • Unexpected system reboots

Network Indicators:

  • Unusual outbound connections from PDU devices
  • Traffic to unexpected ports

SIEM Query:

source="rittal-pdu" AND (event="command_injection" OR event="unauthorized_access")

🔗 References

📤 Share & Export