CVE-2024-29837

8.8 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to access administrator functionality in Evolution Controller's web interface when any user is already signed in. It affects Evolution Controller versions 2.04.560.31.03.2024 and below. Attackers can exploit poor session management to gain unauthorized administrative access.

💻 Affected Systems

Products:
  • Evolution Controller
Versions: 2.04.560.31.03.2024 and below
Operating Systems: Not specified - likely embedded/controller OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web interface with poor session management. Requires at least one user to be signed in for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative control, modify configurations, access sensitive data, or disrupt operations.

🟠

Likely Case

Unauthorized access to administrative functions leading to data exposure, configuration changes, or privilege escalation.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication, and monitoring detecting unauthorized access attempts.

🌐 Internet-Facing: HIGH - Web interfaces exposed to internet are directly vulnerable to unauthenticated attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires poor session management and at least one active user session. No public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

1. Contact vendor for patched version
2. Apply update when available
3. Verify session management improvements

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Evolution Controller web interface to trusted networks only

Session Timeout Reduction

all

Configure shorter session timeouts to reduce window of opportunity

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the web interface
  • Monitor for unauthorized access attempts and implement strong authentication requirements

🔍 How to Verify

Check if Vulnerable:

Check Evolution Controller version in web interface or system settings. If version is 2.04.560.31.03.2024 or below, system is vulnerable.

Check Version:

Check web interface settings or system information page for version details

Verify Fix Applied:

Verify updated version number and test session management by attempting to access admin functions without proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful admin access
  • Admin access from unusual IP addresses or without proper authentication logs

Network Indicators:

  • Unauthorized access to admin endpoints without authentication headers
  • Suspicious session management patterns

SIEM Query:

source="evolution_controller" AND (event_type="admin_access" AND auth_status="unauthenticated")

🔗 References

📤 Share & Export