CVE-2024-44754

6.8 MEDIUM

📋 TL;DR

This vulnerability allows physically proximate attackers to extract cryptographic keys from the internal flash memory of Minut M2 devices running firmware version #15142. Attackers can then use these keys to inject modified firmware into other Minut M2 products via USB. Only Minut M2 devices with the specific vulnerable firmware version are affected.

💻 Affected Systems

Products:
  • Minut M2
Versions: Firmware version #15142
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with physical USB port access. The vulnerability is in the firmware's cryptographic key storage implementation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain complete control over Minut M2 devices, enabling firmware manipulation, data theft, device repurposing for malicious activities, or creation of a botnet of compromised devices.

🟠

Likely Case

Local attackers with physical access compromise individual devices to bypass security controls, extract sensitive data, or install unauthorized firmware modifications.

🟢

If Mitigated

With proper physical security controls preventing unauthorized access to USB ports, the vulnerability cannot be exploited despite its presence in firmware.

🌐 Internet-Facing: LOW - This is a local physical access vulnerability requiring USB connection, not remotely exploitable over networks.
🏢 Internal Only: MEDIUM - Physical access to devices is required, making it relevant for devices in uncontrolled physical environments or where insider threats exist.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires physical access to USB port and specialized hardware/knowledge for flash memory extraction and firmware modification, but no authentication is needed once physical access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version newer than #15142

Vendor Advisory: https://www.amlisoft.se/sec_20241114.html

Restart Required: Yes

Instructions:

1. Check current firmware version via Minut app or device interface
2. Download latest firmware from Minut official sources
3. Apply firmware update following manufacturer instructions
4. Verify successful update and device functionality

🔧 Temporary Workarounds

Physical Access Control

all

Prevent unauthorized physical access to device USB ports

Disable Unused USB Ports

all

Physically disable or block USB ports if device functionality doesn't require them

🧯 If You Can't Patch

  • Implement strict physical security controls to prevent unauthorized access to devices
  • Isolate affected devices in secure locations with limited physical access

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device settings or via Minut app - if version is exactly #15142, device is vulnerable

Check Version:

Check via Minut mobile app device settings or device web interface if available

Verify Fix Applied:

Confirm firmware version has changed from #15142 to a newer version after update

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Firmware version changes not initiated by administrators
  • USB connection events from unauthorized systems

Network Indicators:

  • Unusual device behavior or communication patterns post-physical access

SIEM Query:

Device logs showing firmware version changes OR USB connection events from unauthorized hosts

🔗 References

📤 Share & Export