CVE-2024-8887

10.0 CRITICAL

📋 TL;DR

CVE-2024-8887 is an authentication bypass vulnerability in CIRCUTOR Q-SMT firmware that allows attackers to access all web interface functionalities without credentials. This affects CIRCUTOR Q-SMT devices running firmware version 1.0.4. Attackers can perform denial of service attacks and potentially manipulate device operations.

💻 Affected Systems

Products:
  • CIRCUTOR Q-SMT
Versions: Firmware version 1.0.4
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to disable critical power monitoring functions, manipulate settings, and cause sustained service disruption affecting connected systems.

🟠

Likely Case

Attackers bypass authentication to access web interface, modify device configurations, and trigger denial of service conditions disrupting monitoring operations.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to isolated network segments with minimal operational disruption.

🌐 Internet-Facing: HIGH - Web interface accessible from internet would allow unauthenticated attackers to exploit this vulnerability remotely.
🏢 Internal Only: HIGH - Even internally, any attacker with network access to the device can bypass authentication and access all web functionalities.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically have low exploitation complexity once the bypass method is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available information

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products

Restart Required: Yes

Instructions:

1. Contact CIRCUTOR for firmware updates. 2. Download updated firmware from vendor portal. 3. Upload firmware via web interface. 4. Reboot device to apply changes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Q-SMT devices in separate VLAN with strict firewall rules limiting access to authorized management systems only.

Web Interface Restriction

all

Block external access to web interface ports (typically 80/443) at network perimeter and restrict internal access to specific IP addresses.

🧯 If You Can't Patch

  • Implement strict network access controls allowing only authorized management systems to communicate with Q-SMT devices
  • Monitor network traffic to Q-SMT devices for unauthorized access attempts and authentication bypass patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or device management console. If version is 1.0.4, device is vulnerable.

Check Version:

Check via web interface at http(s)://[device-ip]/ or consult device documentation for CLI version check

Verify Fix Applied:

After firmware update, verify version is no longer 1.0.4 and test authentication bypass attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access without valid credentials
  • Multiple login attempts from single source with varying parameters

Network Indicators:

  • HTTP requests to login endpoints with unusual parameters
  • Traffic to web interface from unauthorized IP addresses

SIEM Query:

source_ip=[Q-SMT-IP] AND (http_method=POST AND uri CONTAINS 'login' AND response_code=200) WITHOUT preceding successful auth

🔗 References

📤 Share & Export