CVE-2024-45722

7.5 HIGH

📋 TL;DR

This vulnerability in Ruijie Reyee OS allows attackers to easily calculate MQTT credentials due to weak credential mechanisms. Affected systems include Ruijie Reyee OS versions 2.206.x through 2.319.x, potentially exposing network devices to unauthorized access.

💻 Affected Systems

Products:
  • Ruijie Reyee OS
Versions: 2.206.x up to but not including 2.320.x
Operating Systems: Ruijie Reyee OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices running vulnerable Reyee OS versions with MQTT services enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of network devices, allowing attackers to intercept or manipulate MQTT communications, reconfigure network settings, or pivot to other systems.

🟠

Likely Case

Unauthorized access to MQTT broker, enabling attackers to monitor network traffic, extract sensitive information, or disrupt MQTT-based services.

🟢

If Mitigated

Limited impact if strong network segmentation, access controls, and monitoring are in place to detect and block unauthorized MQTT connections.

🌐 Internet-Facing: HIGH - If devices are exposed to the internet, attackers can remotely exploit this without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this to gain unauthorized access to MQTT services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves weak credential calculation that can be easily reverse-engineered, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.320.x and later

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01

Restart Required: Yes

Instructions:

1. Check current Reyee OS version. 2. Download and install version 2.320.x or later from Ruijie support. 3. Reboot the device after installation. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable MQTT Service

all

Temporarily disable MQTT services if not required for operation.

# Check Reyee OS documentation for MQTT disable commands

Network Segmentation

all

Isolate affected devices in separate network segments with strict firewall rules.

# Configure firewall to restrict MQTT port 1883/8883 access

🧯 If You Can't Patch

  • Implement strict network access controls to limit MQTT traffic to trusted sources only.
  • Monitor MQTT connections and logs for unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check the Reyee OS version via device web interface or CLI. If version is between 2.206.x and 2.319.x, the device is vulnerable.

Check Version:

# Check Reyee OS documentation for version check command

Verify Fix Applied:

After patching, verify the OS version is 2.320.x or later and test MQTT credential generation mechanisms.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized MQTT connection attempts
  • Failed authentication logs from MQTT broker
  • Unexpected MQTT topic subscriptions or publications

Network Indicators:

  • Unusual MQTT traffic patterns
  • Connections to MQTT port 1883/8883 from untrusted sources

SIEM Query:

source="reyee_os" AND (event="mqtt_auth_failure" OR event="mqtt_connection")

🔗 References

📤 Share & Export