CVE-2024-28143
📋 TL;DR
This vulnerability allows attackers to change any user's password without knowing the current password via the /cgi/admin.cgi endpoint. Attackers can exploit this through CSRF or direct requests to take over accounts. Organizations using ImageAccess products with vulnerable versions are affected.
💻 Affected Systems
- ImageAccess products with admin.cgi endpoint
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through administrative account takeover, leading to data theft, system manipulation, or ransomware deployment.
Likely Case
Unauthorized password changes for user accounts, potentially leading to privilege escalation and data access.
If Mitigated
Limited impact if strong network segmentation, authentication controls, and monitoring are in place.
🎯 Exploit Status
Exploitation requires access to the admin interface but doesn't require authentication for password change function. CSRF exploitation possible.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific version
Vendor Advisory: https://www.imageaccess.de/?page=SupportPortal&lang=en
Restart Required: Yes
Instructions:
1. Contact ImageAccess support for patch. 2. Apply vendor-provided update. 3. Restart affected services. 4. Verify fix implementation.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict access to admin.cgi endpoint to trusted IP addresses only
iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
Web Server Configuration
allAdd authentication requirement for password change function
# Add to web server config: Location /cgi/admin.cgi
# Require valid-user
# AuthType Basic
# AuthName "Restricted Area"
🧯 If You Can't Patch
- Implement strict network segmentation to isolate vulnerable systems
- Enable multi-factor authentication and monitor for unauthorized password changes
🔍 How to Verify
Check if Vulnerable:
Test if password change at /cgi/admin.cgi accepts -rsetpass+-aaction+- parameter without current password validation
Check Version:
Check product version in web interface or contact vendor support
Verify Fix Applied:
Verify password change function now requires current password and proper CSRF tokens
📡 Detection & Monitoring
Log Indicators:
- Unusual password change requests
- Multiple failed authentication attempts followed by password reset
- Requests to /cgi/admin.cgi with rsetpass parameter
Network Indicators:
- HTTP POST requests to /cgi/admin.cgi containing password reset parameters
- Unusual source IPs accessing admin interface
SIEM Query:
source="web_logs" AND uri="/cgi/admin.cgi" AND (params CONTAINS "rsetpass" OR params CONTAINS "password_change")