CVE-2024-48123

8.4 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code on HI-SCAN 6040i Hitrax HX-03-19-I devices by uploading a malicious script via USB autorun. It affects organizations using these specific security screening systems in default configurations. Attackers need physical access to insert a USB device.

💻 Affected Systems

Products:
  • HI-SCAN 6040i Hitrax HX-03-19-I
Versions: All versions with vulnerable USB autorun function
Operating Systems: Embedded system specific to the device
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with USB ports accessible and autorun enabled by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to disable security screening, steal sensitive data, or pivot to connected networks.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to screening data and system functions.

🟢

If Mitigated

Limited impact if USB ports are physically secured and autorun is disabled.

🌐 Internet-Facing: LOW - Requires physical USB access, not remotely exploitable.
🏢 Internal Only: HIGH - Physical access to screening systems in secure areas could lead to significant security breaches.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Requires physical access to insert USB device but no authentication needed once inserted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with vendor for specific firmware update

Vendor Advisory: Contact Smiths Detection (manufacturer) for advisory

Restart Required: Yes

Instructions:

1. Contact Smiths Detection for firmware update. 2. Apply firmware update following vendor instructions. 3. Restart device to activate patch.

🔧 Temporary Workarounds

Disable USB Autorun

all

Disable automatic execution of scripts from USB devices

Check device settings for USB autorun/autoplay options and disable

Physical USB Port Security

all

Physically secure or disable USB ports

Use USB port locks or epoxy to secure ports
Disable USB ports in BIOS if possible

🧯 If You Can't Patch

  • Implement strict physical security controls around devices
  • Disable all USB ports and remove USB functionality

🔍 How to Verify

Check if Vulnerable:

Check if USB autorun is enabled in device settings and test with safe USB script

Check Version:

Check device display or management interface for firmware version

Verify Fix Applied:

Verify firmware version is updated and test USB autorun functionality is disabled

📡 Detection & Monitoring

Log Indicators:

  • USB device insertion logs
  • Unauthorized script execution attempts
  • System process anomalies

Network Indicators:

  • Unusual outbound connections from device
  • Anomalous traffic patterns

SIEM Query:

Device:HI-SCAN AND (Event:USB_insert OR Process:unexpected_script)

🔗 References

📤 Share & Export