CVE-2024-4600

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in Socomec Net Vision version 7.20 allows attackers to trick authenticated users into performing unauthorized actions like adding or updating accounts. This occurs due to insufficient input sanitization in the 'set_param.cgi' file. Organizations using Socomec Net Vision 7.20 are affected.

💻 Affected Systems

Products:
  • Socomec Net Vision
Versions: 7.20
Operating Systems: Not specified, likely embedded/network device OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects version 7.20; other versions may be unaffected. Requires user authentication to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could create new administrative accounts, modify existing accounts, or change system configurations, potentially gaining full control over the Net Vision system.

🟠

Likely Case

Attackers trick users into performing unauthorized account modifications or configuration changes, leading to privilege escalation or system compromise.

🟢

If Mitigated

With proper CSRF protections and user awareness, the risk is reduced to minimal, though the vulnerability still exists in the software.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated user into visiting a malicious webpage. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-socomec-net-vision

Restart Required: No

Instructions:

Check vendor advisory for updates. If no patch, apply workarounds and monitor for security updates.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to forms and validate them on the server-side for 'set_param.cgi' and other critical endpoints.

Custom implementation required; no standard commands.

Use SameSite Cookies

all

Configure session cookies with SameSite=Strict or Lax attributes to prevent CSRF attacks.

Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Isolate Net Vision system on internal network with strict access controls.
  • Implement web application firewall (WAF) rules to block CSRF attempts.

🔍 How to Verify

Check if Vulnerable:

Check Net Vision version via web interface or system logs; if version is 7.20, it is vulnerable.

Check Version:

Check web interface or consult system documentation; no standard CLI command provided.

Verify Fix Applied:

Verify version is updated beyond 7.20 or test for CSRF protections on 'set_param.cgi' endpoint.

📡 Detection & Monitoring

Log Indicators:

  • Unusual account creation or modification logs from 'set_param.cgi' requests.
  • Multiple failed or unexpected parameter changes in system logs.

Network Indicators:

  • HTTP POST requests to 'set_param.cgi' from unexpected sources or without referrer headers.

SIEM Query:

source="net_vision" AND uri="/set_param.cgi" AND (action="add_account" OR action="update_account")

🔗 References

📤 Share & Export