CVE-2024-13417

4.6 MEDIUM

📋 TL;DR

This vulnerability allows attackers to send specially crafted payloads to 2N RFID readers, causing a denial-of-service condition that requires a device restart to recover. All customers using affected 2N devices with vulnerable firmware versions are impacted. The vulnerability is mitigated in 2N OS version 2.46.

💻 Affected Systems

Products:
  • 2N RFID readers running 2N OS
Versions: Versions prior to 2.46
Operating Systems: 2N OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected 2N RFID readers are vulnerable until patched.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of RFID access control functionality until manual device restart, potentially disrupting physical security operations.

🟠

Likely Case

Temporary RFID reader unavailability requiring on-site or remote restart to restore functionality.

🟢

If Mitigated

No impact if patched to version 2.46 or if proper network segmentation prevents malicious payload delivery.

🌐 Internet-Facing: MEDIUM - Internet-facing RFID readers could be targeted by remote attackers, but exploitation requires specific payload crafting.
🏢 Internal Only: LOW - Internal network access required, reducing attack surface to authorized or compromised internal actors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific payloads but no authentication is needed to send them to the RFID reader interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.46

Vendor Advisory: https://www.2n.com/en-GB/download/cve_2024_1341x_2nos_2_46_v1pdf

Restart Required: Yes

Instructions:

1. Download 2N OS version 2.46 from official 2N sources. 2. Follow 2N's firmware update procedures for your specific RFID reader model. 3. Restart the device after update completion.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to RFID readers to only authorized management systems and trusted networks.

Input Validation via Firewall

all

Implement network firewall rules to filter or block unusual payloads to RFID reader ports.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with RFID readers.
  • Monitor RFID reader availability and implement alerting for unexpected restarts or downtime.

🔍 How to Verify

Check if Vulnerable:

Check 2N OS version via device management interface or console. Versions below 2.46 are vulnerable.

Check Version:

Check via 2N device web interface or console using manufacturer-specific commands (varies by model).

Verify Fix Applied:

Confirm 2N OS version is 2.46 or higher after applying the update.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected RFID reader restarts
  • Connection attempts with unusual payload patterns to RFID ports

Network Indicators:

  • Unusual traffic spikes to RFID reader ports (typically TCP/80, TCP/443, or manufacturer-specific ports)
  • Malformed packets sent to RFID reader IP addresses

SIEM Query:

source="rfid-reader-logs" AND (event="restart" OR event="crash") OR destination_port IN (80, 443, [RFID_PORTS]) AND packet_size > [THRESHOLD]

🔗 References

📤 Share & Export