CVE-2024-44610

5.6 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on PCAN-Ethernet Gateway devices by injecting shell metacharacters in software update requests to processing.php. It affects PCAN-Ethernet Gateway FD versions before 1.3.0 and PCAN-Ethernet Gateway versions before 2.11.0. Organizations using these industrial network gateways for CAN bus communication are at risk.

💻 Affected Systems

Products:
  • PCAN-Ethernet Gateway FD
  • PCAN-Ethernet Gateway
Versions: PCAN-Ethernet Gateway FD < 1.3.0, PCAN-Ethernet Gateway < 2.11.0
Operating Systems: Embedded Linux (device-specific)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web interface's software update functionality. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary commands with device privileges, potentially leading to disruption of industrial control systems, data exfiltration, or lateral movement into connected networks.

🟠

Likely Case

Remote code execution leading to device takeover, configuration modification, or installation of persistent backdoors on vulnerable gateways.

🟢

If Mitigated

Limited impact if network segmentation prevents external access to the vulnerable endpoint, though internal threats remain.

🌐 Internet-Facing: HIGH if devices are exposed to the internet, as the exploit requires network access to the vulnerable endpoint.
🏢 Internal Only: HIGH as the vulnerability can be exploited by any network-connected attacker who can reach the device's web interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on GitHub demonstrates command injection via HTTP POST requests to processing.php. Exploitation requires network access to the device's web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PCAN-Ethernet Gateway FD 1.3.0+, PCAN-Ethernet Gateway 2.11.0+

Vendor Advisory: https://cve.mahi.be/peak_pcan_dr/

Restart Required: Yes

Instructions:

1. Download latest firmware from PEAK-System website. 2. Access device web interface. 3. Navigate to System > Firmware Update. 4. Upload new firmware file. 5. Apply update and restart device.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PCAN gateway devices on separate VLANs with strict firewall rules limiting access to authorized management systems only.

Web Interface Access Control

all

Configure firewall to block external access to device web interface (typically port 80/443) and restrict internal access to management networks.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices from untrusted networks
  • Deploy network intrusion detection systems to monitor for exploit attempts targeting processing.php endpoint

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface at System > Information. If version is below patched versions, device is vulnerable.

Check Version:

curl -s http://device-ip/system_info | grep -i version

Verify Fix Applied:

After update, verify firmware version shows 1.3.0+ for FD model or 2.11.0+ for standard model. Test by attempting to access processing.php with metacharacters - should no longer execute commands.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to processing.php containing shell metacharacters like ;, |, &, $, or backticks
  • Unusual process execution from web server context

Network Indicators:

  • HTTP traffic to device IP on port 80/443 with POST requests to /processing.php containing command injection patterns

SIEM Query:

source="web_logs" AND uri="/processing.php" AND (request_body CONTAINS ";" OR request_body CONTAINS "|" OR request_body CONTAINS "&" OR request_body CONTAINS "`")

🔗 References

📤 Share & Export