CVE-2024-2422

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary commands on LenelS2 NetBox access control and event monitoring systems. Organizations using NetBox versions 5.6.1 and earlier are affected, potentially compromising physical security systems.

💻 Affected Systems

Products:
  • LenelS2 NetBox
Versions: 5.6.1 and earlier
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the NetBox web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to disable physical access controls, manipulate security logs, and pivot to other network systems.

🟠

Likely Case

Unauthorized access to physical facilities, data exfiltration, and disruption of security monitoring capabilities.

🟢

If Mitigated

Limited impact if proper network segmentation and authentication controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.6.2 or later

Vendor Advisory: https://www.corporate.carrier.com/Images/CARR-PSA-2024-01-NetBox_tcm558-227956.pdf

Restart Required: Yes

Instructions:

1. Download NetBox 5.6.2 or later from LenelS2 support portal. 2. Backup current configuration and database. 3. Run installer with administrative privileges. 4. Restart NetBox services. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate NetBox systems from general network access

Authentication Hardening

all

Implement multi-factor authentication and strong password policies

🧯 If You Can't Patch

  • Implement strict network access controls to limit NetBox access to authorized IPs only
  • Enable detailed logging and monitoring for suspicious authentication and command execution attempts

🔍 How to Verify

Check if Vulnerable:

Check NetBox version in web interface under Help > About or via Windows Services console

Check Version:

sc query "NetBox" | findstr /i "display_name"

Verify Fix Applied:

Confirm version is 5.6.2 or later and test authentication and command functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Command execution in application logs
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from NetBox server
  • Traffic to unexpected ports

SIEM Query:

source="netbox" AND (event_type="command_execution" OR auth_failure_count>5)

🔗 References

📤 Share & Export