CVE-2024-48123
📋 TL;DR
This vulnerability allows attackers to execute arbitrary code on HI-SCAN 6040i Hitrax HX-03-19-I devices by uploading a malicious script via USB autorun. It affects organizations using these specific security screening systems in default configurations. Attackers need physical access to insert a USB device.
💻 Affected Systems
- HI-SCAN 6040i Hitrax HX-03-19-I
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to disable security screening, steal sensitive data, or pivot to connected networks.
Likely Case
Local privilege escalation leading to unauthorized access to screening data and system functions.
If Mitigated
Limited impact if USB ports are physically secured and autorun is disabled.
🎯 Exploit Status
Requires physical access to insert USB device but no authentication needed once inserted.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check with vendor for specific firmware update
Vendor Advisory: Contact Smiths Detection (manufacturer) for advisory
Restart Required: Yes
Instructions:
1. Contact Smiths Detection for firmware update. 2. Apply firmware update following vendor instructions. 3. Restart device to activate patch.
🔧 Temporary Workarounds
Disable USB Autorun
allDisable automatic execution of scripts from USB devices
Check device settings for USB autorun/autoplay options and disable
Physical USB Port Security
allPhysically secure or disable USB ports
Use USB port locks or epoxy to secure ports
Disable USB ports in BIOS if possible
🧯 If You Can't Patch
- Implement strict physical security controls around devices
- Disable all USB ports and remove USB functionality
🔍 How to Verify
Check if Vulnerable:
Check if USB autorun is enabled in device settings and test with safe USB script
Check Version:
Check device display or management interface for firmware version
Verify Fix Applied:
Verify firmware version is updated and test USB autorun functionality is disabled
📡 Detection & Monitoring
Log Indicators:
- USB device insertion logs
- Unauthorized script execution attempts
- System process anomalies
Network Indicators:
- Unusual outbound connections from device
- Anomalous traffic patterns
SIEM Query:
Device:HI-SCAN AND (Event:USB_insert OR Process:unexpected_script)