Missing Protection Mechanism for Alternate Hardware Interface
The device directly executes .patch firmware upgrade files on a USB stick without any prior authentication in the admin interface. This leads to an unauthenticated code execution via the firmware upgrade function.
The vendor provides a patched version V6.21.00.2 which can be downloaded from the following URL: www.rittal.com/de-de/products/deep/3124300 https://www.rittal.com/de-de/products/deep/3124300
Configurations
Workarounds
Exploits
SEC Consult has published proof of concept code for this vulnerability.