CVE-2024-41889

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to execute arbitrary code on affected Pimax devices by exploiting improper WebSocket endpoint validation. It affects multiple Pimax products when they accept WebSocket connections from unintended sources. Users of vulnerable Pimax hardware and software are at risk.

💻 Affected Systems

Products:
  • Pimax PiTool software
  • Pimax VR headsets
Versions: Specific versions not detailed in references; likely multiple versions before patching.
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in WebSocket handling; exact product/version mapping requires vendor confirmation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution leading to data theft, ransomware deployment, or device takeover.

🟠

Likely Case

Remote attacker gains control of the device to install malware, exfiltrate data, or pivot to other network resources.

🟢

If Mitigated

Attack blocked at network perimeter; isolated devices remain protected but vulnerable if exposed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to vulnerable WebSocket endpoints; CVSS 9.8 suggests trivial exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Pimax downloads page for latest PiTool version.

Vendor Advisory: https://pimax.com/pages/downloads-manuals

Restart Required: Yes

Instructions:

1. Visit Pimax downloads page.
2. Download latest PiTool software.
3. Install update and restart system.

🔧 Temporary Workarounds

Network Segmentation

all

Block inbound WebSocket connections to Pimax devices at firewall.

Configure firewall to deny inbound TCP connections on WebSocket ports (typically 80/443) to Pimax devices.

Disable Unused Services

windows

Turn off WebSocket or network services not required for operation.

Check PiTool settings to disable remote access features if available.

🧯 If You Can't Patch

  • Isolate affected devices on separate VLAN with strict access controls.
  • Implement network monitoring for suspicious WebSocket traffic to/from Pimax devices.

🔍 How to Verify

Check if Vulnerable:

Check if PiTool version is outdated via Pimax downloads page; test network exposure by attempting WebSocket connections.

Check Version:

Open PiTool software and check version in settings or about dialog.

Verify Fix Applied:

Verify PiTool is updated to latest version from vendor; test that WebSocket endpoints reject unauthorized connections.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected WebSocket connection attempts in PiTool or system logs.
  • Failed authentication or access denied entries related to WebSocket.

Network Indicators:

  • Inbound WebSocket traffic to Pimax device ports from untrusted sources.
  • Anomalous outbound connections from Pimax devices post-exploit.

SIEM Query:

source_ip IN (untrusted_networks) AND dest_port IN (80,443) AND protocol="websocket" AND dest_ip IN (pimax_devices)

🔗 References

📤 Share & Export