CVE-2024-28143

8.4 HIGH

📋 TL;DR

This vulnerability allows attackers to change any user's password without knowing the current password via the /cgi/admin.cgi endpoint. Attackers can exploit this through CSRF or direct requests to take over accounts. Organizations using ImageAccess products with vulnerable versions are affected.

💻 Affected Systems

Products:
  • ImageAccess products with admin.cgi endpoint
Versions: All versions prior to patched release
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web administration interface of ImageAccess products.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through administrative account takeover, leading to data theft, system manipulation, or ransomware deployment.

🟠

Likely Case

Unauthorized password changes for user accounts, potentially leading to privilege escalation and data access.

🟢

If Mitigated

Limited impact if strong network segmentation, authentication controls, and monitoring are in place.

🌐 Internet-Facing: HIGH - Directly accessible web interface with authentication bypass.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the admin interface but doesn't require authentication for password change function. CSRF exploitation possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific version

Vendor Advisory: https://www.imageaccess.de/?page=SupportPortal&lang=en

Restart Required: Yes

Instructions:

1. Contact ImageAccess support for patch. 2. Apply vendor-provided update. 3. Restart affected services. 4. Verify fix implementation.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict access to admin.cgi endpoint to trusted IP addresses only

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Web Server Configuration

all

Add authentication requirement for password change function

# Add to web server config: Location /cgi/admin.cgi
# Require valid-user
# AuthType Basic
# AuthName "Restricted Area"

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Enable multi-factor authentication and monitor for unauthorized password changes

🔍 How to Verify

Check if Vulnerable:

Test if password change at /cgi/admin.cgi accepts -rsetpass+-aaction+- parameter without current password validation

Check Version:

Check product version in web interface or contact vendor support

Verify Fix Applied:

Verify password change function now requires current password and proper CSRF tokens

📡 Detection & Monitoring

Log Indicators:

  • Unusual password change requests
  • Multiple failed authentication attempts followed by password reset
  • Requests to /cgi/admin.cgi with rsetpass parameter

Network Indicators:

  • HTTP POST requests to /cgi/admin.cgi containing password reset parameters
  • Unusual source IPs accessing admin interface

SIEM Query:

source="web_logs" AND uri="/cgi/admin.cgi" AND (params CONTAINS "rsetpass" OR params CONTAINS "password_change")

🔗 References

📤 Share & Export