CVE-2024-24116

9.8 CRITICAL

📋 TL;DR

A privilege escalation vulnerability in Ruijie RG-NBS2009G-P switches allows remote attackers to gain administrative access via the system/config_menu.htm endpoint. This affects organizations using these switches with the vulnerable RGOS firmware version. Attackers can exploit this without authentication to take full control of the network device.

💻 Affected Systems

Products:
  • Ruijie RG-NBS2009G-P
Versions: RGOS v.10.4(1)P2 Release(9736)
Operating Systems: RGOS (Ruijie proprietary OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific firmware version mentioned; other versions may also be vulnerable but unconfirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of network switch allowing attacker to reconfigure network, intercept traffic, disable security controls, and pivot to other systems.

🟠

Likely Case

Unauthorized administrative access leading to network disruption, data interception, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if network segmentation isolates management interfaces and strict access controls are enforced.

🌐 Internet-Facing: HIGH - Directly exploitable if management interface is exposed to internet.
🏢 Internal Only: HIGH - Even internally, any network-accessible device is vulnerable to authenticated or unauthenticated attackers.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub demonstrates exploitation via HTTP request to vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check Ruijie official website for security advisories and firmware updates. No official patch information available at this time.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Block access to the vulnerable endpoint and restrict management interfaces to trusted IPs only.

access-list 100 deny tcp any any eq 80
access-list 100 deny tcp any any eq 443
access-list 100 permit ip any any
interface vlan 1
ip access-group 100 in

Disable HTTP/HTTPS Management

all

Disable web management interface and use CLI/SSH only.

no ip http server
no ip http secure-server

🧯 If You Can't Patch

  • Isolate switch management VLAN from user networks
  • Implement strict network segmentation and firewall rules to limit access to management interfaces

🔍 How to Verify

Check if Vulnerable:

Check if system/config_menu.htm endpoint is accessible without authentication via HTTP/HTTPS.

Check Version:

show version

Verify Fix Applied:

Verify that system/config_menu.htm endpoint requires authentication or returns 404/403.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to system/config_menu.htm
  • Unexpected configuration changes
  • New administrative sessions from unusual IPs

Network Indicators:

  • HTTP requests to /system/config_menu.htm from unauthorized sources
  • Unusual management traffic patterns

SIEM Query:

source="switch_logs" AND (uri="/system/config_menu.htm" OR event="configuration change")

🔗 References

📤 Share & Export