CVE-2024-22082

7.5 HIGH

📋 TL;DR

Unauthenticated directory listing vulnerability in Elspec G5 digital fault recorder web interface allows attackers to enumerate system directories without credentials. This affects Elspec G5 versions 1.1.4.15 and earlier, potentially exposing sensitive system information to unauthorized users.

💻 Affected Systems

Products:
  • Elspec G5 digital fault recorder
Versions: 1.1.4.15 and earlier
Operating Systems: Embedded/Proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Web interface must be enabled and accessible

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers map the entire filesystem, discover sensitive configuration files, credentials, or other critical system information that could lead to further exploitation or system compromise.

🟠

Likely Case

Attackers gain reconnaissance information about the system structure, installed components, and potential attack vectors for follow-on attacks.

🟢

If Mitigated

Limited information disclosure with no direct system compromise, though it still provides attackers with valuable reconnaissance data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests to enumerate directories without authentication

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.1.4.15

Vendor Advisory: https://www.elspec-ltd.com/support/security-advisories/

Restart Required: Yes

Instructions:

1. Contact Elspec support for patched firmware. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Verify web interface functionality post-update.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to the web interface using firewall rules

Disable Web Interface

all

Temporarily disable the web interface if not required for operations

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the device from untrusted networks
  • Deploy network monitoring to detect directory enumeration attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to access directory listing via web interface without authentication using tools like curl or browser

Check Version:

Check device web interface or console for firmware version information

Verify Fix Applied:

Verify directory listing requests return proper authentication errors or are blocked

📡 Detection & Monitoring

Log Indicators:

  • Multiple HTTP GET requests for directory paths without authentication
  • Unusual access patterns to web interface

Network Indicators:

  • HTTP requests for common directory paths (/, /etc/, /var/, etc.) without authentication headers

SIEM Query:

source="webserver" AND (uri="/" OR uri CONTAINS "/.") AND status=200 AND NOT auth_present

🔗 References

📤 Share & Export