CVE-2024-12643

8.1 HIGH

📋 TL;DR

The tbm-client from Chunghwa Telecom has two vulnerabilities: lack of CSRF protection in APIs allowing unauthenticated remote attacks via phishing, and an absolute path traversal vulnerability in one API enabling arbitrary file deletion. This affects users running the vulnerable tbm-client software. Attackers can delete critical system files remotely without authentication.

💻 Affected Systems

Products:
  • Chunghwa Telecom tbm-client
Versions: All versions prior to patch
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the local web server component that provides APIs for website communication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via deletion of critical operating system files, leading to system instability, data loss, or rendering the system inoperable.

🟠

Likely Case

Targeted deletion of user files, configuration files, or application data causing service disruption and potential data loss.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and proper file permissions restrict deletion of critical system files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking users into visiting malicious websites (phishing) but doesn't require authentication to the tbm-client.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-8301-c2f4b-2.html

Restart Required: Yes

Instructions:

1. Check the vendor advisory for patched version
2. Download and install the updated tbm-client from Chunghwa Telecom
3. Restart the system or tbm-client service

🔧 Temporary Workarounds

Disable tbm-client web server

all

Stop the local web server component that hosts the vulnerable APIs

Check tbm-client documentation for disabling web server functionality

Network isolation

all

Block external access to the tbm-client web server port

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source not="127.0.0.1" port port="[tbm-port]" protocol="tcp" reject'
netsh advfirewall firewall add rule name="Block tbm-client" dir=in action=block protocol=TCP localport=[tbm-port] remoteip=any

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems running tbm-client from untrusted networks
  • Deploy application control solutions to prevent unauthorized file deletion operations

🔍 How to Verify

Check if Vulnerable:

Check if tbm-client is running and accessible on its default port, and verify version against vendor advisory

Check Version:

Check tbm-client documentation for version command or examine installed package version

Verify Fix Applied:

Verify tbm-client version matches patched version from vendor advisory and test API endpoints for CSRF protection

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in system logs
  • Access to tbm-client APIs from external IP addresses
  • Failed file deletion attempts with path traversal patterns

Network Indicators:

  • HTTP requests to tbm-client API endpoints containing path traversal sequences (../)
  • External connections to tbm-client web server port

SIEM Query:

source="*tbm-client*" AND (event="file_delete" OR uri="*../*")

🔗 References

📤 Share & Export