CVE-2024-44572

8.8 HIGH

📋 TL;DR

RELY-PCIe versions v22.2.1 through v23.1.0 contain a command injection vulnerability in the sys_mgmt function that allows attackers to execute arbitrary commands on affected systems. This affects organizations using RELY-PCIe hardware/software for industrial or embedded systems. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • RELY-PCIe
Versions: v22.2.1 to v23.1.0
Operating Systems: Embedded/Linux-based systems running RELY-PCIe
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with the sys_mgmt function exposed via network interfaces or web interfaces are particularly vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root/administrator privileges, allowing attackers to install persistent backdoors, exfiltrate sensitive data, disrupt industrial operations, or pivot to other network systems.

🟠

Likely Case

Unauthorized command execution leading to service disruption, data theft, or installation of cryptocurrency miners/ransomware on vulnerable systems.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and input validation are implemented, potentially restricting damage to isolated segments.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Command injection vulnerabilities typically have low exploitation complexity once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v23.1.1 or later

Vendor Advisory: https://www.relyum.com/web/support/vulnerability-report/

Restart Required: Yes

Instructions:

1. Download the latest RELY-PCIe firmware/software from the vendor portal. 2. Backup current configuration. 3. Apply the update following vendor documentation. 4. Restart the system. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to RELY-PCIe management interfaces using firewall rules

iptables -A INPUT -p tcp --dport [RELY-PCIe_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [RELY-PCIe_PORT] -j DROP

Input Validation Enhancement

all

Implement additional input validation/sanitization for sys_mgmt function parameters

🧯 If You Can't Patch

  • Isolate affected systems in a dedicated network segment with strict firewall rules
  • Disable or restrict access to the sys_mgmt function if not required for operations

🔍 How to Verify

Check if Vulnerable:

Check the RELY-PCIe software version via the management interface or CLI

Check Version:

rely-pcie --version or check via web interface at /version endpoint

Verify Fix Applied:

Verify the version is v23.1.1 or later and test that command injection attempts are properly blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts to sys_mgmt function
  • Suspicious process creation from RELY-PCIe services

Network Indicators:

  • Unusual outbound connections from RELY-PCIe systems
  • Traffic to known malicious IPs from affected systems
  • Unexpected port scanning from RELY-PCIe devices

SIEM Query:

source="RELY-PCIe" AND (event_type="command_execution" OR process_name="sh" OR process_name="bash")

🔗 References

📤 Share & Export