CVE-2024-29082

8.6 HIGH

📋 TL;DR

An unauthenticated remote attacker can bypass authentication and factory reset Vonets industrial wifi bridge devices via unprotected goform endpoints. This affects Vonets industrial wifi bridge relays and repeaters running software versions 3.3.23.6.9 and earlier. Organizations using these devices for industrial network connectivity are vulnerable.

💻 Affected Systems

Products:
  • Vonets industrial wifi bridge relays
  • Vonets wifi bridge repeaters
Versions: 3.3.23.6.9 and prior
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network disruption as devices are factory reset, requiring physical access to reconfigure, potentially causing operational downtime in industrial environments.

🟠

Likely Case

Unauthorized factory reset of devices leading to network connectivity loss and requiring reconfiguration, disrupting industrial operations.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls preventing external access to vulnerable endpoints.

🌐 Internet-Facing: HIGH - Devices exposed to the internet can be directly attacked without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests to unprotected endpoints, making it trivial for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.3.23.6.9

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08

Restart Required: Yes

Instructions:

1. Check current firmware version via device web interface. 2. Contact Vonets for updated firmware. 3. Backup device configuration. 4. Apply firmware update. 5. Reboot device. 6. Restore configuration if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Vonets devices in separate network segments with strict firewall rules.

Access Control Lists

all

Implement ACLs to restrict access to device management interfaces.

🧯 If You Can't Patch

  • Remove internet-facing access and place devices behind firewalls with strict inbound rules.
  • Implement network monitoring for unauthorized access attempts to device management interfaces.

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device web interface or via SSH if available. Versions 3.3.23.6.9 and earlier are vulnerable.

Check Version:

Check via web interface at http://[device-ip]/ or consult device documentation for CLI version check.

Verify Fix Applied:

Verify firmware version is updated beyond 3.3.23.6.9 and test authentication requirements for goform endpoints.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to goform endpoints without authentication
  • Factory reset events in device logs
  • Unauthorized configuration changes

Network Indicators:

  • HTTP POST requests to /goform endpoints from unauthorized sources
  • Unusual traffic patterns to device management interfaces

SIEM Query:

source_ip=* AND (url_path="/goform/*" OR event_type="factory_reset") AND NOT user_authenticated=true

🔗 References

📤 Share & Export