CVE-2024-7801

6.5 MEDIUM

📋 TL;DR

This SQL injection vulnerability in Microchip TimeProvider 4100's data plot modules allows attackers to execute arbitrary SQL commands on the database. It affects TimeProvider 4100 devices running versions 1.0 through 2.4.6. Organizations using these devices for network time synchronization are at risk.

💻 Affected Systems

Products:
  • Microchip TimeProvider 4100 Grandmaster
Versions: from 1.0 before 2.4.7
Operating Systems: Embedded OS on TimeProvider 4100
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the data plot modules specifically. Devices must have these modules enabled/accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the TimeProvider device, allowing data theft, configuration modification, or disruption of time synchronization services across the network.

🟠

Likely Case

Extraction of sensitive configuration data, modification of time settings, or denial of service affecting time-dependent applications.

🟢

If Mitigated

Limited impact if network segmentation and access controls prevent unauthorized access to the vulnerable interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited with readily available tools. The unauthenticated nature makes exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.7

Vendor Advisory: https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-unathenticated-sql-injection

Restart Required: Yes

Instructions:

1. Download firmware version 2.4.7 from Microchip support portal. 2. Backup current configuration. 3. Apply firmware update via web interface or CLI. 4. Reboot device. 5. Verify version shows 2.4.7.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to TimeProvider web interface and management ports to authorized IPs only.

Use firewall rules to allow only specific management networks to access TCP ports 80/443 on the TimeProvider.

Disable Data Plot Modules

all

If not required, disable the vulnerable data plot modules to remove attack surface.

Access web interface > Configuration > Data Plot > Disable modules

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate TimeProvider devices from untrusted networks.
  • Deploy a web application firewall (WAF) with SQL injection protection rules in front of the TimeProvider interface.

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > About) or CLI command 'show version'. If version is between 1.0 and 2.4.6 inclusive, device is vulnerable.

Check Version:

show version

Verify Fix Applied:

Confirm firmware version shows 2.4.7 or higher. Test data plot functionality to ensure modules work without SQL errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in web server logs
  • Multiple failed login attempts followed by SQL-like queries
  • Unexpected configuration changes in system logs

Network Indicators:

  • SQL keywords (SELECT, UNION, INSERT, etc.) in HTTP requests to TimeProvider
  • Unusual traffic patterns to data plot endpoints

SIEM Query:

source="timeprovider_logs" AND ("sql" OR "syntax" OR "union" OR "select")

🔗 References

📤 Share & Export