CVE-2024-24486

9.1 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to modify device settings on Silex Technology DS-600 devices via an unauthenticated SAVE EEP_DATA command. This affects all systems running DS-600 firmware version 1.4.1, potentially allowing unauthorized configuration changes.

💻 Affected Systems

Products:
  • Silex Technology DS-600
Versions: Firmware v1.4.1
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attackers to reconfigure network settings, disable security features, or brick the device.

🟠

Likely Case

Unauthorized modification of device settings leading to service disruption or security bypass.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict network segmentation.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation allows attackers to directly target exposed devices.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending a specific command to the device without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check Silex Technology website for firmware updates. If available, download and apply the latest firmware following vendor instructions.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate DS-600 devices from untrusted networks using firewalls or VLANs.

Access Control Lists

all

Implement network ACLs to restrict access to DS-600 devices to authorized IP addresses only.

🧯 If You Can't Patch

  • Segment DS-600 devices on isolated network segments with no internet access.
  • Implement strict firewall rules to allow only necessary traffic to DS-600 devices from trusted sources.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or console. If version is 1.4.1, device is vulnerable.

Check Version:

Check device web interface or use vendor-specific CLI commands to query firmware version.

Verify Fix Applied:

Verify firmware version has been updated to a version later than 1.4.1.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized SAVE EEP_DATA commands in device logs
  • Unexpected configuration changes

Network Indicators:

  • Unusual traffic patterns to DS-600 devices
  • SAVE EEP_DATA commands from unauthorized sources

SIEM Query:

device_type:"DS-600" AND (command:"SAVE EEP_DATA" OR config_change:true) FROM unauthorized_ip

🔗 References

📤 Share & Export