CVE-2024-11946

6.5 MEDIUM

📋 TL;DR

This vulnerability allows network-adjacent attackers to intercept and tamper with TrueNAS firmware update files transmitted in cleartext. Attackers can modify update packages to potentially execute arbitrary code as root on affected TrueNAS CORE installations. All TrueNAS CORE devices using vulnerable versions are affected.

💻 Affected Systems

Products:
  • iXsystems TrueNAS CORE
Versions: 13.0-U6.3 and earlier versions
Operating Systems: TrueNAS CORE
Default Config Vulnerable: ⚠️ Yes
Notes: Requires network adjacency to the TrueNAS device. Authentication is not required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers achieve remote code execution as root, leading to complete system compromise, data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Attackers tamper with firmware updates to install malicious code, potentially creating persistent access or disrupting system functionality.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to potential denial of service from corrupted updates.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access and ability to intercept/man-in-the-middle update traffic. Often combined with other vulnerabilities for full RCE.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: TrueNAS CORE 13.0-U6.4 and later

Vendor Advisory: https://www.truenas.com/docs/core/13.0/gettingstarted/corereleasenotes/#130-u63

Restart Required: Yes

Instructions:

1. Backup configuration and data. 2. Navigate to System → Update in TrueNAS web interface. 3. Apply available update to 13.0-U6.4 or later. 4. Reboot system after update completes.

🔧 Temporary Workarounds

Disable Automatic Updates

all

Prevent automatic firmware updates that use vulnerable transmission method

Navigate to System → Update in TrueNAS web interface and disable automatic updates

Network Segmentation

all

Isolate TrueNAS devices from untrusted networks to prevent MITM attacks

🧯 If You Can't Patch

  • Segment TrueNAS devices on isolated VLANs with strict firewall rules
  • Monitor network traffic for unauthorized update attempts and implement certificate pinning if possible

🔍 How to Verify

Check if Vulnerable:

Check TrueNAS version in web interface (System → Information) or run 'midclt call system.info' via SSH

Check Version:

midclt call system.info | grep version

Verify Fix Applied:

Confirm version is 13.0-U6.4 or later in System → Information

📡 Detection & Monitoring

Log Indicators:

  • Unexpected firmware update failures
  • Unusual network traffic during update windows
  • Failed update verification checks

Network Indicators:

  • Unencrypted tar file transfers on port 80/443
  • MITM activity near TrueNAS devices
  • Suspicious update server connections

SIEM Query:

source="truenas" AND (event="update_failed" OR event="firmware_verification_error")

🔗 References

📤 Share & Export