Vulnerability Notice: CVE-2024-10456

Vendor:
Deltaww

Affected Product:
InfraSuite_Device_Master

CVSS SCORE:
9.3 of 10 (Critical)

Risk Index:
8.18 of 10 (High)

Description

A critical vulnerability has been identified in the deserialization process of the Delta Electronics InfraSuite Device Master versions prior to 1.0.12. This vulnerability is associated with the Device-Gateway component, potentially allowing unauthorized access and manipulation of the system through deserialization of arbitrary .NET objects before authentication is enforced.

 

Affected Product(s)

Delta Electronics InfraSuite Device Master versions prior to 1.0.12.

 

Technical Details

The Delta Electronics InfraSuite Device Master is a centralized management system used for overseeing and managing the data center infrastructure. This software provides critical functionality allowing system administrators to maintain operational uptime by monitoring and managing a host of devices connected to a network. However, in versions before 1.0.12, a significant vulnerability exists in the way this software handles object deserialization.

The main issue lies within the Device-Gateway component of the InfraSuite Device Master. Deserialization vulnerabilities occur when untrusted data is used to abuse the logic of an application, allowing cyber attackers to manipulate serialized objects and possibly inject malicious objects, which are then deserialized to execute arbitrary code. In this context, the specific deserialization flaw allows threat actors to load malicious .NET objects before the system completes its authentication protocols.

The vulnerability is identified under CVE-2024-10456 and is categorized under the Common Weakness Enumeration as CWE-502: Deserialization of Untrusted Data. This vulnerability has high implications due to its proximity to the core logic of the application, where the deserialization occurs before authentication measures can verify the integrity or the origin of the incoming serialized data.

Delta Electronics reportedly uses .NET technologies which are common in the development of highly integrated management systems like the InfraSuite Device Master, leading to compatibility with various devices and systems through established protocols. The prior lack of safeguards against deserialization attacks within this component means that a potential attacker, possibly with limited initial access, could inject data designed to perform malicious operations once deserialized by the software’s logic.

Following the disclosure of this vulnerability, further reviews of similar versions and products have prompted a release to address these security loopholes. Users of Delta Electronics InfraSuite Device Master are therefore urged to upgrade to the latest version, as the update includes patches that paste over the pathways allowing such exploitation.

 

Weakness

The core weakness associated with this vulnerability is CWE-502: Deserialization of Untrusted Data. This type of weakness arises when a data deserialization process happens without proper checks, opening up avenues for attackers to introduce and execute untrusted code.

 

Impact Assessment

If exploited, this vulnerability could allow an attacker to execute arbitrary code in the context of the software running on InfraSuite Device Master. Given the nature of this centralized management system, successful exploitation could lead to unauthorized access to critical infrastructure systems, potentially resulting in data exfiltration, sabotage of operations, or disablement of essential monitoring devices.

 

Active Exploitation

While no specific adversary groups targeting this vulnerability have been documented to date, historical precedents suggest that any discovered exploit could quickly be adopted by threat actors seeking to take advantage of vulnerable systems. Exploitation could occur remotely, considering that the vulnerability affects the Device-Gateway, which acts as a network-based entry point into the system.

 

Ransomware Association

Currently, no specific ransomware attacks have been directly associated with this particular vulnerability. However, deserialization vulnerabilities similar to this have often been leveraged in broader ransomware campaigns as part of an initial access tactic, wherein malicious actors first gain entry into a system before deploying ransomware payloads.

 

Mitigation and Resolution

Delta Electronics has released an updated version of the InfraSuite Device Master, version 1.0.12, which addresses this deserialization vulnerability. Users are strongly urged to update their systems to the latest version to prevent potential exploitation.

Applying the patch will ensure that deserialization operations are handled in a secure manner, thereby fortifying one of the most critical components of Delta’s infrastructure management solution.

 

Recommendations

  • We strongly recommend that all customers upgrade Delta Electronics InfraSuite Device Master to version 1.0.12 immediately.
  • Ensure that your systems have no unpatched software, particularly those exposed to network connections.
  • Conduct regular security audits and vulnerability assessments of all data center management software.
  • Monitor network traffic for unusual activities that may indicate an ongoing or attempted exploitation.
  • Implement application whitelisting to prevent arbitrary code execution.

 

ย References

 

View In Platform

Share This Post On