CVE-2024-10381

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to bypass authentication on Matrix Door Controller Cosec Vega FAXQ devices through improper session management in the web interface. Attackers can send specially crafted HTTP requests to gain complete control of affected devices. Organizations using these physical access control systems are at risk.

💻 Affected Systems

Products:
  • Matrix Door Controller Cosec Vega FAXQ
Versions: Specific versions not detailed in reference; all versions with vulnerable web interface likely affected
Operating Systems: Embedded system firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with web management interface enabled are vulnerable. Physical access control systems typically have web interfaces for administration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of physical access control system allowing unauthorized entry, device reconfiguration, and potential physical security breaches.

🟠

Likely Case

Unauthorized access to door control systems enabling attackers to manipulate door locks, access logs, and security settings.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH - Web interface vulnerabilities are directly exploitable over network connections.
🏢 Internal Only: HIGH - Even internally, attackers could compromise physical security controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-288 indicates authentication bypass via crafted requests. No authentication required for exploitation based on description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0328

Restart Required: Yes

Instructions:

1. Contact Matrix/Cosec vendor for firmware updates. 2. Check vendor website for security advisories. 3. Apply firmware patches following vendor instructions. 4. Restart devices after patching.

🔧 Temporary Workarounds

Network Isolation

all

Isolate door controllers from untrusted networks and internet access

Configure firewall rules to block external access to door controller management interfaces

Access Control Lists

all

Restrict management interface access to authorized IP addresses only

Implement network ACLs allowing only trusted management stations to connect to controller web interface

🧯 If You Can't Patch

  • Segment door controller network from corporate and internet networks using VLANs/firewalls
  • Implement strict network monitoring for unusual HTTP requests to controller management interfaces

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vendor patched versions. Test web interface for session management weaknesses.

Check Version:

Check web interface system information page or vendor-specific CLI commands (vendor-dependent)

Verify Fix Applied:

Verify firmware version matches patched version from vendor. Test authentication bypass attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to management interface
  • Authentication bypass attempts
  • Configuration changes from unauthorized IPs

Network Indicators:

  • HTTP requests to door controller management ports from unexpected sources
  • Traffic patterns suggesting authentication bypass

SIEM Query:

source_ip NOT IN authorized_management_ips AND dest_port=80|443 AND dest_ip IN door_controllers AND http_method=POST|GET

🔗 References

📤 Share & Export