CVE-2024-4813

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in Ruijie RG-UAC Unified Internet Behavior Management Audit System allows remote attackers to execute arbitrary operating system commands via command injection in the physical interface configuration component. Attackers can exploit this to gain unauthorized access, manipulate system settings, or deploy malware. All users of affected Ruijie RG-UAC versions are at risk.

💻 Affected Systems

Products:
  • Ruijie RG-UAC Unified Internet Behavior Management Audit System
Versions: Up to 20240506
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the physical interface configuration component at /view/networkConfig/physicalInterface/interface_commit.php

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands with system privileges, install persistent backdoors, exfiltrate sensitive data, pivot to internal networks, or disrupt network operations.

🟠

Likely Case

Unauthorized command execution leading to system configuration changes, credential theft, installation of cryptocurrency miners or other malware, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation, command execution restrictions, and monitoring in place, potentially resulting in failed exploitation attempts or contained damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit has been publicly disclosed and may be used. The vulnerability allows remote exploitation without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

Contact Ruijie vendor for patch information. Monitor vendor website for security updates. Consider upgrading to versions after 20240506 if available.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to the vulnerable interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport [PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [PORT] -j DROP

File Access Control

linux

Remove or restrict access to the vulnerable PHP file

chmod 000 /view/networkConfig/physicalInterface/interface_commit.php
mv /view/networkConfig/physicalInterface/interface_commit.php /view/networkConfig/physicalInterface/interface_commit.php.disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from critical assets
  • Deploy web application firewall (WAF) with command injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check if system version is 20240506 or earlier. Test if /view/networkConfig/physicalInterface/interface_commit.php is accessible and accepts 'name' parameter.

Check Version:

Check system web interface or administrative console for version information

Verify Fix Applied:

Verify system version is newer than 20240506. Test that command injection attempts via the 'name' parameter are blocked or sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /view/networkConfig/physicalInterface/interface_commit.php
  • Command execution patterns in web server logs
  • Suspicious system commands executed from web process

Network Indicators:

  • Unusual outbound connections from Ruijie system
  • Command and control traffic patterns
  • Exploitation attempts to the vulnerable endpoint

SIEM Query:

source="web_server" AND uri="/view/networkConfig/physicalInterface/interface_commit.php" AND (param="name" AND value CONTAINS "|" OR value CONTAINS ";" OR value CONTAINS "`" OR value CONTAINS "$")

🔗 References

📤 Share & Export