CVE-2024-41913

8.8 HIGH

📋 TL;DR

This vulnerability in Poly Clariti Manager devices allows attackers to execute arbitrary code by exploiting improper input sanitization. It affects organizations using Poly Clariti Manager firmware versions up to 10.10.2.2. The high CVSS score indicates significant potential impact.

💻 Affected Systems

Products:
  • Poly Clariti Manager
Versions: Firmware builds up to 10.10.2.2
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running vulnerable firmware versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing remote code execution, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Unauthorized access to the Clariti Manager system, potential configuration changes, and disruption of video conferencing services.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can directly exploit this vulnerability without internal access.
🏢 Internal Only: MEDIUM - Still significant risk from internal threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-434 indicates unauthenticated file upload vulnerability, typically requiring minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version 10.10.2.3 or later

Vendor Advisory: https://support.hp.com/us-en/document/ish_11006488-11006512-16/hpsbpy03957

Restart Required: Yes

Instructions:

1. Download latest firmware from HP support portal. 2. Backup current configuration. 3. Upload firmware via web interface. 4. Apply update and restart device.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Poly Clariti Manager devices from untrusted networks and internet access

Access Control Lists

all

Implement strict firewall rules to limit access to management interfaces

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices
  • Deploy web application firewall (WAF) with file upload protection rules

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface: System > About > Firmware Version

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Verify firmware version is 10.10.2.3 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload attempts
  • Unexpected system restarts
  • Unauthorized configuration changes

Network Indicators:

  • Unusual traffic to management interface
  • File upload requests to vulnerable endpoints

SIEM Query:

source="poly_clariti" AND (event="file_upload" OR event="system_restart")

🔗 References

📤 Share & Export