CVE-2024-32384

6.8 MEDIUM

📋 TL;DR

Kerlink gateways running KerOS versions before 5.10 expose their web interface over unencrypted HTTP only, without HTTPS support. This allows man-in-the-middle attackers to intercept, read, and modify traffic between clients and the gateway. Organizations using affected Kerlink IoT gateways are vulnerable.

💻 Affected Systems

Products:
  • Kerlink gateways running KerOS
Versions: All versions prior to 5.10
Operating Systems: KerOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects web interface traffic; other protocols may have separate security considerations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept administrative credentials, modify gateway configurations, inject malicious firmware updates, or disrupt IoT network operations.

🟠

Likely Case

Credential theft leading to unauthorized gateway access, configuration changes, or traffic interception of IoT device communications.

🟢

If Mitigated

Limited to denial-of-service attacks if strong authentication and network segmentation are in place, but traffic confidentiality remains compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires man-in-the-middle position but uses standard HTTP interception techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: KerOS 5.10

Vendor Advisory: https://keros.docs.kerlink.com/security/security_advisories_kerOS5

Restart Required: Yes

Instructions:

1. Download KerOS 5.10 from Kerlink support portal. 2. Backup current configuration. 3. Apply firmware update via web interface or CLI. 4. Verify HTTPS is enabled and HTTP is disabled in interface settings.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Kerlink gateways on separate VLANs with strict firewall rules limiting access to management interfaces.

Reverse Proxy with TLS Termination

linux

Place a reverse proxy (nginx, Apache) in front of gateways to add HTTPS encryption and restrict direct HTTP access.

# Example nginx config snippet:
server {
    listen 443 ssl;
    server_name gateway.example.com;
    ssl_certificate /path/to/cert.pem;
    ssl_certificate_key /path/to/key.pem;
    location / {
        proxy_pass http://gateway-ip:80;
        proxy_set_header Host $host;
    }
}

🧯 If You Can't Patch

  • Deploy network-level encryption (IPsec/VPN tunnels) between management clients and gateways.
  • Implement strict network access controls allowing only trusted IPs to connect to gateway web interfaces.

🔍 How to Verify

Check if Vulnerable:

Access gateway web interface via HTTP (not HTTPS) and check KerOS version in admin panel. If version <5.10 and HTTPS unavailable, vulnerable.

Check Version:

curl -s http://[gateway-ip]/api/version || Check web interface login page

Verify Fix Applied:

Confirm KerOS version is 5.10+ and web interface is accessible only via HTTPS (HTTP should redirect or be disabled).

📡 Detection & Monitoring

Log Indicators:

  • Failed HTTPS connection attempts
  • Unusual admin login locations/times
  • Configuration change logs without authorized user

Network Indicators:

  • HTTP traffic to gateway management ports (typically 80)
  • Lack of HTTPS traffic to gateways
  • ARP spoofing or unusual routing near gateways

SIEM Query:

source_ip=[gateway-ip] AND (protocol=HTTP OR port=80) AND NOT (user=authorized_admin)

🔗 References

📤 Share & Export