CVE-2024-47146
📋 TL;DR
This vulnerability allows an attacker to obtain the serial number of Ruijie Reyee OS devices by sniffing RAW WiFi signals when physically adjacent. It affects Ruijie Reyee OS versions 2.206.x through 2.319.x. The attacker must be within wireless range of the vulnerable device.
💻 Affected Systems
- Ruijie Reyee OS
📦 What is this software?
Reyee Os by Ruijienetworks
⚠️ Risk & Real-World Impact
Worst Case
Serial number disclosure could facilitate device tracking, inventory enumeration, or serve as reconnaissance for further attacks against specific device models.
Likely Case
An attacker in physical proximity could map network devices and gather information about deployed hardware for potential follow-up attacks.
If Mitigated
With proper physical security controls and network segmentation, the impact is limited to information disclosure without direct system compromise.
🎯 Exploit Status
Exploitation requires wireless sniffing tools and physical proximity. No authentication is required as the vulnerability leaks information via wireless signals.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.320.x and later
Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01
Restart Required: Yes
Instructions:
1. Check current firmware version. 2. Download firmware version 2.320.x or later from Ruijie support portal. 3. Upload and apply firmware update through device management interface. 4. Reboot device to complete installation.
🔧 Temporary Workarounds
Physical Security Controls
allRestrict physical access to areas where devices are deployed to prevent wireless signal sniffing.
Wireless Signal Shielding
allUse RF shielding or Faraday cages in sensitive areas to prevent wireless signal leakage.
🧯 If You Can't Patch
- Deploy devices in physically secure locations with restricted access
- Implement network segmentation to limit potential impact of device enumeration
🔍 How to Verify
Check if Vulnerable:
Check device firmware version through web interface or CLI. If version is between 2.206.x and 2.319.x, device is vulnerable.
Check Version:
Check via device web interface or use vendor-specific CLI commands for firmware version verification.
Verify Fix Applied:
Verify firmware version is 2.320.x or later after applying update.
📡 Detection & Monitoring
Log Indicators:
- No direct log indicators as this is passive wireless sniffing
Network Indicators:
- Wireless monitoring tools detecting unusual RAW WiFi packet capture near devices
SIEM Query:
No specific SIEM query as this is physical layer attack without network traffic logs.