CVE-2024-27771
📋 TL;DR
CVE-2024-27771 is a path traversal vulnerability in Unitronics Unistream Unilogic software that could allow remote code execution. Attackers can exploit this to execute arbitrary code on affected devices. Organizations using Unitronics Unistream devices with Unilogic software versions prior to 1.35.227 are affected.
💻 Affected Systems
- Unitronics Unistream Unilogic
📦 What is this software?
Unilogic by Unitronics
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attackers to execute arbitrary code, potentially gaining complete control over the industrial control system, disrupting operations, or causing physical damage.
Likely Case
Remote code execution leading to unauthorized access, data theft, or disruption of industrial processes controlled by the vulnerable devices.
If Mitigated
Limited impact if devices are properly segmented and access controlled, though the vulnerability still exists in the software.
🎯 Exploit Status
Path traversal vulnerabilities typically have low exploitation complexity, and the CWE-22 classification suggests unauthenticated access may be possible.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.35.227
Vendor Advisory: https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0
Restart Required: Yes
Instructions:
1. Download Unilogic version 1.35.227 or later from Unitronics official website. 2. Install the update on all affected Unistream devices. 3. Restart devices to apply the patch.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Unitronics Unistream devices from untrusted networks and the internet.
Access Control Lists
allImplement strict firewall rules to limit access to Unistream devices only from authorized management stations.
🧯 If You Can't Patch
- Segment industrial control network from corporate and internet networks using firewalls
- Implement strict access controls and monitor all traffic to/from Unistream devices
🔍 How to Verify
Check if Vulnerable:
Check Unilogic software version on Unistream devices. If version is below 1.35.227, the device is vulnerable.
Check Version:
Check version in Unilogic software interface or device management console
Verify Fix Applied:
Verify Unilogic software version is 1.35.227 or higher after patching.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns
- Unexpected process execution
- Authentication bypass attempts
Network Indicators:
- Unusual traffic to Unistream device ports
- Path traversal patterns in HTTP requests
SIEM Query:
source="unistream" AND (event="file_access" OR event="process_execution") AND status="unusual"
🔗 References
- https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered
- https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0
- https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered
- https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0