CVE-2024-45493

9.8 CRITICAL

📋 TL;DR

CVE-2024-45493 allows attackers to bypass local-only authentication restrictions for internal user accounts on MSA FieldServer Gateway devices. Attackers who know internal user passwords can authenticate from the network instead of requiring local device access. This affects all MSA FieldServer Gateway installations running versions 5.0.0 through 6.5.2.

💻 Affected Systems

Products:
  • MSA FieldServer Gateway
Versions: 5.0.0 through 6.5.2
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within affected version range are vulnerable regardless of configuration. Internal user accounts exist by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attackers to reconfigure industrial control systems, manipulate safety-critical data, or disrupt operations in critical infrastructure environments.

🟠

Likely Case

Unauthorized access to device configuration, potential data manipulation, and lateral movement within industrial networks.

🟢

If Mitigated

Limited impact if internal user passwords are strong and unknown to attackers, but authentication bypass still presents significant risk.

🌐 Internet-Facing: HIGH if devices are exposed to internet, as attackers can attempt authentication remotely without needing local network access.
🏢 Internal Only: HIGH as attackers on the internal network can exploit this vulnerability to gain unauthorized access to critical industrial control devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of internal user passwords. Attack complexity is low once credentials are known. No public exploit code available at disclosure time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.0.0

Vendor Advisory: https://us.msasafety.com/security-notices

Restart Required: Yes

Instructions:

1. Download FieldServer Gateway version 7.0.0 from MSA Safety website. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart the device. 5. Verify successful update and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate FieldServer Gateway devices in separate network segments with strict firewall rules preventing external access.

Strong Password Enforcement

all

Change all internal user passwords to complex, unique values and ensure they are not reused elsewhere.

🧯 If You Can't Patch

  • Implement strict network access controls allowing only authorized IP addresses to communicate with FieldServer Gateway devices.
  • Monitor authentication logs for unusual access patterns and implement alerting for failed authentication attempts.

🔍 How to Verify

Check if Vulnerable:

Check device version via web interface or CLI. If version is between 5.0.0 and 6.5.2 inclusive, device is vulnerable.

Check Version:

Check via web interface at http://<device-ip>/status or consult device documentation for CLI command.

Verify Fix Applied:

Verify device version shows 7.0.0 or higher. Test authentication from network with internal user credentials should fail.

📡 Detection & Monitoring

Log Indicators:

  • Successful authentication from non-local IP addresses for internal user accounts
  • Multiple failed authentication attempts followed by success

Network Indicators:

  • Authentication attempts to FieldServer Gateway from unexpected network segments
  • Traffic patterns indicating configuration changes

SIEM Query:

source="fieldserver" AND (event_type="authentication" AND user="internal_*" AND source_ip!=127.0.0.1 AND source_ip!=::1)

🔗 References

📤 Share & Export