CVE-2024-52285

5.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to access sensitive data through exposed MQTT URLs without authentication in SiPass integrated access control systems. Affected organizations include those using SiPass integrated AC5102 (ACC-G2) or SiPass integrated ACC-AP devices.

💻 Affected Systems

Products:
  • SiPass integrated AC5102 (ACC-G2)
  • SiPass integrated ACC-AP
Versions: All versions < V6.4.8
Operating Systems: Embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with MQTT service enabled and exposed without authentication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive access control data, user credentials, device configurations, or manipulate access control systems to gain unauthorized physical access.

🟠

Likely Case

Unauthenticated attackers accessing sensitive configuration data, user information, or device status through exposed MQTT endpoints.

🟢

If Mitigated

Limited to internal network access with proper segmentation and authentication controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to MQTT endpoints (typically port 1883/8883).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V6.4.8

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-515903.html

Restart Required: Yes

Instructions:

1. Download V6.4.8 firmware from Siemens support portal. 2. Backup current configuration. 3. Apply firmware update via web interface or management console. 4. Verify successful update and restore configuration if needed.

🔧 Temporary Workarounds

Network segmentation

all

Isolate affected devices from untrusted networks and internet exposure

Firewall restrictions

linux

Block external access to MQTT ports (1883/TCP, 8883/TCP)

iptables -A INPUT -p tcp --dport 1883 -j DROP
iptables -A INPUT -p tcp --dport 8883 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit MQTT traffic to authorized management systems only
  • Monitor MQTT traffic for unauthorized access attempts and implement intrusion detection

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or console. If version < V6.4.8, device is vulnerable.

Check Version:

Check via web interface at http(s)://device-ip/ or console connection

Verify Fix Applied:

Confirm firmware version is V6.4.8 or higher and test MQTT endpoints require authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated MQTT connection attempts
  • Access to sensitive MQTT topics from unauthorized sources

Network Indicators:

  • Unencrypted MQTT traffic to port 1883 from external sources
  • MQTT CONNECT packets without authentication credentials

SIEM Query:

source_port=1883 OR source_port=8883 AND (NOT auth_success=true)

🔗 References

📤 Share & Export