CVE-2024-28805

9.1 CRITICAL

📋 TL;DR

CVE-2024-28805 is an incorrect access control vulnerability in Italtel i-MCS NFV 12.1.0-20211215 that allows unauthorized users to bypass authentication mechanisms. This affects organizations using this specific version of Italtel's NFV platform, potentially exposing sensitive network functions virtualization infrastructure.

💻 Affected Systems

Products:
  • Italtel i-MCS NFV
Versions: 12.1.0-20211215
Operating Systems: Linux-based NFV platform
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the December 15, 2021 build of version 12.1.0. Other versions may be affected but not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to take full control of NFV infrastructure, deploy malicious virtual network functions, intercept communications, and pivot to other network segments.

🟠

Likely Case

Unauthorized access to administrative functions leading to configuration changes, service disruption, and data exfiltration from virtualized network services.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing lateral movement even if initial access is gained.

🌐 Internet-Facing: HIGH - If the i-MCS NFV interface is exposed to the internet, attackers can directly exploit this vulnerability without internal access.
🏢 Internal Only: HIGH - Even internally, this vulnerability allows privilege escalation and unauthorized access to critical NFV management functions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Incorrect access control vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.gruppotim.it/it/footer/red-team.html

Instructions:

Contact Italtel support for patch availability and installation guidance. Check the vendor advisory for updates.

🔧 Temporary Workarounds

Network Isolation

linux

Isolate the i-MCS NFV management interface from untrusted networks

# Configure firewall rules to restrict access to i-MCS NFV management IP/ports
# Example: iptables -A INPUT -s trusted_network -p tcp --dport management_port -j ACCEPT
# iptables -A INPUT -p tcp --dport management_port -j DROP

Access Control Lists

all

Implement strict IP-based access controls for the management interface

# Configure network device ACLs to permit only authorized management stations
# Example access-list configuration depends on network equipment

🧯 If You Can't Patch

  • Implement network segmentation to isolate the vulnerable system from critical infrastructure
  • Deploy additional authentication layers (2FA, VPN gateways) in front of the management interface

🔍 How to Verify

Check if Vulnerable:

Check the system version via administrative interface or CLI. If version matches 12.1.0-20211215, assume vulnerable.

Check Version:

Check via i-MCS NFV web interface or consult system documentation for version query commands

Verify Fix Applied:

After applying vendor patches, verify version has changed from vulnerable version and test access control mechanisms.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to administrative endpoints
  • Authentication bypass logs
  • Unexpected configuration changes

Network Indicators:

  • Unusual traffic patterns to NFV management ports from unauthorized sources
  • Authentication request anomalies

SIEM Query:

source="i-mcs-nfv" AND (event_type="auth_failure" OR event_type="config_change") AND src_ip NOT IN authorized_ips

🔗 References

📤 Share & Export