CVE-2024-8456

9.8 CRITICAL

📋 TL;DR

This critical vulnerability allows unauthenticated remote attackers to download and upload firmware and system configurations on affected PLANET Technology switch models. Attackers can gain full administrative control of devices, potentially compromising entire network segments. Organizations using vulnerable PLANET switch models are affected.

💻 Affected Systems

Products:
  • PLANET Technology switches (specific models not detailed in available references)
Versions: Not specified in available references
Operating Systems: Embedded switch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in firmware upload/download functionality without authentication requirements. All affected switches with default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network compromise where attackers gain full control of switches, enabling traffic interception, network segmentation bypass, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Attackers upload malicious firmware to gain administrative access, reconfigure network settings, intercept sensitive data, and use switches as pivot points for further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated network segments, though compromised switches still pose significant risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and involves simple HTTP requests to firmware endpoints. Attackers can easily script exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-8062-92f17-2.html

Restart Required: Yes

Instructions:

1. Check PLANET Technology website for firmware updates. 2. Download latest firmware for your switch model. 3. Upload new firmware via management interface. 4. Reboot switch to apply changes. 5. Verify firmware version after reboot.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate vulnerable switches from internet and untrusted networks using VLANs and firewall rules

Access Control Lists

all

Restrict management interface access to trusted IP addresses only

access-list 100 permit ip [trusted-network] any
interface vlan 1
ip access-group 100 in

🧯 If You Can't Patch

  • Immediately isolate affected switches from internet-facing networks and critical systems
  • Implement strict network monitoring for firmware upload/download attempts and configuration changes

🔍 How to Verify

Check if Vulnerable:

Check if switch allows firmware upload/download without authentication via HTTP/HTTPS management interface

Check Version:

show version (via CLI) or check web interface System Information page

Verify Fix Applied:

Attempt unauthenticated firmware upload/download after patch - should be blocked or require authentication

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated firmware upload/download attempts
  • Unexpected firmware version changes
  • Configuration file modifications

Network Indicators:

  • HTTP POST requests to firmware upload endpoints from untrusted sources
  • Unexpected firmware download traffic

SIEM Query:

source_ip NOT IN trusted_networks AND (url CONTAINS 'firmware' OR url CONTAINS 'config') AND http_method IN ('POST', 'GET')

🔗 References

📤 Share & Export