CVE-2024-12013

7.6 HIGH

📋 TL;DR

The 130.8005 TCP/IP Gateway with firmware version 12h exposes an FTP server with default admin credentials, allowing remote attackers to access configuration files containing password hashes and network settings. This affects organizations using this specific industrial control system gateway with vulnerable firmware.

💻 Affected Systems

Products:
  • 130.8005 TCP/IP Gateway
Versions: Firmware version 12h
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with FTP service enabled and default credentials unchanged.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative control, modifies network settings to redirect traffic, extracts password hashes for credential reuse, and potentially disrupts industrial operations.

🟠

Likely Case

Attacker accesses configuration files, extracts password hashes for lateral movement, and modifies network settings to enable further attacks.

🟢

If Mitigated

Attack is prevented by network segmentation and credential changes, limiting impact to isolated network segments.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires FTP access and knowledge of default credentials, but no authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version after 12h

Vendor Advisory: https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-12013

Restart Required: No

Instructions:

1. Download latest firmware from vendor. 2. Upload via management interface. 3. Apply update without restart.

🔧 Temporary Workarounds

Change FTP Credentials

all

Immediately change default FTP admin credentials to strong, unique passwords.

Use device management interface to modify FTP service credentials

Disable FTP Service

all

Disable FTP server if not required for operations.

Use device management interface to disable FTP service

🧯 If You Can't Patch

  • Implement network segmentation to isolate device from untrusted networks
  • Deploy network monitoring to detect FTP brute-force attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via device management interface and verify if FTP service uses default credentials.

Check Version:

Check device management interface for firmware version information

Verify Fix Applied:

Confirm firmware version is updated and test FTP access with old credentials fails.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed FTP login attempts
  • Successful FTP logins from unexpected IPs
  • Configuration file modification timestamps

Network Indicators:

  • FTP traffic to device on port 21
  • Brute-force patterns in FTP authentication

SIEM Query:

source="device_logs" ftp AND (login_failed > 5 OR login_success)

🔗 References

📤 Share & Export