CVE-2024-57155

9.8 CRITICAL

📋 TL;DR

CVE-2024-57155 is an authentication bypass vulnerability in radar v1.0.8 that allows attackers to access sensitive APIs without valid authentication tokens. This affects all systems running the vulnerable radar software version, potentially exposing sensitive data and functionality to unauthorized users.

💻 Affected Systems

Products:
  • radar
Versions: v1.0.8
Operating Systems: All platforms running radar
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of radar v1.0.8 are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with unauthorized access to all API endpoints, potentially leading to data theft, privilege escalation, and full control over the radar system.

🟠

Likely Case

Unauthorized access to sensitive APIs allowing data exfiltration, configuration changes, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation and API gateway controls, but still exposes the vulnerable endpoint to authenticated internal users.

🌐 Internet-Facing: HIGH - Any internet-facing instance is immediately vulnerable to unauthenticated attacks.
🏢 Internal Only: HIGH - Internal instances remain vulnerable to both internal attackers and compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description suggests simple authentication bypass, likely requiring minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub repository for latest version > v1.0.8

Vendor Advisory: https://github.com/wfh45678/radar/issues/100

Restart Required: Yes

Instructions:

1. Check current radar version. 2. Update to latest version from GitHub repository. 3. Restart radar service. 4. Verify authentication is working correctly.

🔧 Temporary Workarounds

API Gateway Authentication

all

Implement authentication at the API gateway level to block unauthorized requests before they reach radar.

Network Segmentation

linux

Restrict network access to radar API endpoints to only trusted IP addresses.

iptables -A INPUT -p tcp --dport [radar_port] -s [trusted_ip] -j ACCEPT
iptables -A INPUT -p tcp --dport [radar_port] -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure of radar API endpoints
  • Deploy a web application firewall (WAF) with authentication bypass protection rules

🔍 How to Verify

Check if Vulnerable:

Attempt to access radar API endpoints without authentication token. If successful, system is vulnerable.

Check Version:

Check radar version in application interface or configuration files

Verify Fix Applied:

Test API endpoints require proper authentication after update. Unauthenticated requests should return 401/403 errors.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated API requests returning 200 OK
  • API access from unexpected IP addresses
  • High volume of requests without authentication headers

Network Indicators:

  • HTTP requests to radar API endpoints without Authorization headers
  • Unusual API endpoint access patterns

SIEM Query:

source="radar" AND (status=200 AND NOT auth_token=*) OR (request_path="/api/*" AND NOT user_agent="legitimate_client")

🔗 References

📤 Share & Export