CVE-2024-0712

7.3 HIGH

📋 TL;DR

This critical vulnerability in the Byzoro Smart S150 Management Platform allows attackers to bypass access controls via the /useratte/inc/userattea.php file, potentially gaining unauthorized access to system functions. It affects Byzoro Smart S150 Management Platform users and can be exploited remotely without authentication. The vulnerability has been publicly disclosed and exploits may already be circulating.

💻 Affected Systems

Products:
  • Byzoro Smart S150 Management Platform
Versions: V31R02B15
Operating Systems: Unknown - likely embedded Linux-based
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the specified version. Other versions may also be affected but not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to gain administrative privileges, access sensitive data, modify configurations, or deploy malware across the network.

🟠

Likely Case

Unauthorized access to management functions, potential data exposure, and system manipulation leading to operational disruption.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication, and monitoring in place, though the vulnerability remains exploitable.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-facing instances particularly vulnerable to widespread attacks.
🏢 Internal Only: HIGH - Even internally deployed systems are at significant risk due to the unauthenticated nature of the exploit and potential for lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub, making it easy for attackers to weaponize. The vendor has not responded to disclosure attempts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Monitor vendor channels for updates and apply immediately when released.

🔧 Temporary Workarounds

Block Access to Vulnerable Endpoint

all

Restrict access to the /useratte/inc/userattea.php file using web server configuration or firewall rules.

# For Apache: Add to .htaccess or virtual host config
<Files "userattea.php">
    Order Deny,Allow
    Deny from all
</Files>
# For Nginx: Add to server block
location ~ /useratte/inc/userattea.php {
    deny all;
    return 403;
}

Network Segmentation

linux

Isolate the Smart S150 Management Platform from untrusted networks and restrict access to authorized IPs only.

# Example iptables rule to restrict access
sudo iptables -A INPUT -p tcp --dport [WEB_PORT] -s [TRUSTED_IP] -j ACCEPT
sudo iptables -A INPUT -p tcp --dport [WEB_PORT] -j DROP

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet access and untrusted networks.
  • Implement strict network access controls and monitor all traffic to/from the management platform for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check if the file /useratte/inc/userattea.php exists and is accessible without proper authentication. Test with curl: curl -v http://[TARGET]/useratte/inc/userattea.php

Check Version:

Check the platform's web interface or configuration files for version information. Typically found in admin panel or /version endpoint.

Verify Fix Applied:

Verify the vulnerable endpoint is no longer accessible or returns proper authentication errors. Test with the same curl command after implementing workarounds.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /useratte/inc/userattea.php
  • Failed authentication attempts followed by successful access to restricted areas
  • Requests from unexpected IP addresses to management endpoints

Network Indicators:

  • HTTP requests to /useratte/inc/userattea.php without authentication headers
  • Unusual traffic patterns to the management platform from external sources

SIEM Query:

source="web_logs" AND (url="/useratte/inc/userattea.php" OR url="*userattea.php") AND (response_code=200 OR response_code=302) AND NOT (user_agent="*monitoring*" OR src_ip IN [TRUSTED_IPS])

🔗 References

📤 Share & Export