CVE-2024-41912

9.8 CRITICAL

📋 TL;DR

This vulnerability in Poly Clariti Manager firmware allows attackers to bypass access controls due to improper implementation. Attackers could gain unauthorized access to device management functions. All organizations using affected Poly Clariti Manager devices are impacted.

💻 Affected Systems

Products:
  • Poly Clariti Manager
Versions: Firmware builds up to 10.10.2.2
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Clariti Manager device allowing attackers to reconfigure telephony systems, intercept communications, or use as pivot point into corporate networks.

🟠

Likely Case

Unauthorized access to management interface leading to configuration changes, service disruption, or credential harvesting.

🟢

If Mitigated

Limited impact if device is isolated in management VLAN with strict network segmentation and access controls.

🌐 Internet-Facing: HIGH - If exposed to internet, devices are directly vulnerable to remote exploitation.
🏢 Internal Only: HIGH - Even internally, any network-accessible device can be exploited by internal threats or compromised hosts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-284 indicates improper access control, typically requiring minimal technical skill to exploit once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version 10.10.2.3 or later

Vendor Advisory: https://support.hp.com/us-en/document/ish_11006235-11006266-16/hpsbpy03958

Restart Required: Yes

Instructions:

1. Download latest firmware from HP support portal. 2. Backup current configuration. 3. Upload firmware via web interface. 4. Apply firmware update. 5. Reboot device. 6. Verify version and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Clariti Manager to management VLAN with strict firewall rules limiting access to authorized IPs only.

Access Control Lists

all

Implement network ACLs to restrict access to Clariti Manager management interface.

🧯 If You Can't Patch

  • Remove internet exposure immediately - ensure device is not accessible from internet
  • Implement strict network segmentation and firewall rules limiting access to management interface

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System > About > Firmware Version

Check Version:

Not applicable - check via web interface or SSH to device and check version

Verify Fix Applied:

Verify firmware version is 10.10.2.3 or later in System > About

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to management interface
  • Configuration changes from unexpected sources
  • Failed authentication followed by successful access

Network Indicators:

  • Unusual traffic patterns to Clariti Manager management port
  • Access from unauthorized source IPs
  • Multiple failed login attempts

SIEM Query:

source_ip=* AND destination_port=443 AND destination_ip=[Clariti_Manager_IP] AND (event_type="authentication_failure" OR event_type="configuration_change")

🔗 References

📤 Share & Export