CVE-2024-4600
📋 TL;DR
A Cross-Site Request Forgery (CSRF) vulnerability in Socomec Net Vision version 7.20 allows attackers to trick authenticated users into performing unauthorized actions like adding or updating accounts. This occurs due to insufficient input sanitization in the 'set_param.cgi' file. Organizations using Socomec Net Vision 7.20 are affected.
💻 Affected Systems
- Socomec Net Vision
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could create new administrative accounts, modify existing accounts, or change system configurations, potentially gaining full control over the Net Vision system.
Likely Case
Attackers trick users into performing unauthorized account modifications or configuration changes, leading to privilege escalation or system compromise.
If Mitigated
With proper CSRF protections and user awareness, the risk is reduced to minimal, though the vulnerability still exists in the software.
🎯 Exploit Status
Exploitation requires tricking an authenticated user into visiting a malicious webpage. No public exploit code is known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified
Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-socomec-net-vision
Restart Required: No
Instructions:
Check vendor advisory for updates. If no patch, apply workarounds and monitor for security updates.
🔧 Temporary Workarounds
Implement CSRF Tokens
allAdd anti-CSRF tokens to forms and validate them on the server-side for 'set_param.cgi' and other critical endpoints.
Custom implementation required; no standard commands.
Use SameSite Cookies
allConfigure session cookies with SameSite=Strict or Lax attributes to prevent CSRF attacks.
Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly
🧯 If You Can't Patch
- Isolate Net Vision system on internal network with strict access controls.
- Implement web application firewall (WAF) rules to block CSRF attempts.
🔍 How to Verify
Check if Vulnerable:
Check Net Vision version via web interface or system logs; if version is 7.20, it is vulnerable.
Check Version:
Check web interface or consult system documentation; no standard CLI command provided.
Verify Fix Applied:
Verify version is updated beyond 7.20 or test for CSRF protections on 'set_param.cgi' endpoint.
📡 Detection & Monitoring
Log Indicators:
- Unusual account creation or modification logs from 'set_param.cgi' requests.
- Multiple failed or unexpected parameter changes in system logs.
Network Indicators:
- HTTP POST requests to 'set_param.cgi' from unexpected sources or without referrer headers.
SIEM Query:
source="net_vision" AND uri="/set_param.cgi" AND (action="add_account" OR action="update_account")