CVE-2024-47146

6.5 MEDIUM

📋 TL;DR

This vulnerability allows an attacker to obtain the serial number of Ruijie Reyee OS devices by sniffing RAW WiFi signals when physically adjacent. It affects Ruijie Reyee OS versions 2.206.x through 2.319.x. The attacker must be within wireless range of the vulnerable device.

💻 Affected Systems

Products:
  • Ruijie Reyee OS
Versions: 2.206.x up to but not including 2.320.x
Operating Systems: Ruijie Reyee OS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable in default configurations. Requires attacker to be physically adjacent to sniff wireless signals.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Serial number disclosure could facilitate device tracking, inventory enumeration, or serve as reconnaissance for further attacks against specific device models.

🟠

Likely Case

An attacker in physical proximity could map network devices and gather information about deployed hardware for potential follow-up attacks.

🟢

If Mitigated

With proper physical security controls and network segmentation, the impact is limited to information disclosure without direct system compromise.

🌐 Internet-Facing: LOW - Requires physical proximity to sniff wireless signals, not exploitable over the internet.
🏢 Internal Only: MEDIUM - Internal attackers or unauthorized personnel with physical access to wireless range could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires wireless sniffing tools and physical proximity. No authentication is required as the vulnerability leaks information via wireless signals.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.320.x and later

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Download firmware version 2.320.x or later from Ruijie support portal. 3. Upload and apply firmware update through device management interface. 4. Reboot device to complete installation.

🔧 Temporary Workarounds

Physical Security Controls

all

Restrict physical access to areas where devices are deployed to prevent wireless signal sniffing.

Wireless Signal Shielding

all

Use RF shielding or Faraday cages in sensitive areas to prevent wireless signal leakage.

🧯 If You Can't Patch

  • Deploy devices in physically secure locations with restricted access
  • Implement network segmentation to limit potential impact of device enumeration

🔍 How to Verify

Check if Vulnerable:

Check device firmware version through web interface or CLI. If version is between 2.206.x and 2.319.x, device is vulnerable.

Check Version:

Check via device web interface or use vendor-specific CLI commands for firmware version verification.

Verify Fix Applied:

Verify firmware version is 2.320.x or later after applying update.

📡 Detection & Monitoring

Log Indicators:

  • No direct log indicators as this is passive wireless sniffing

Network Indicators:

  • Wireless monitoring tools detecting unusual RAW WiFi packet capture near devices

SIEM Query:

No specific SIEM query as this is physical layer attack without network traffic logs.

🔗 References

📤 Share & Export