The Skylab IGX IIoT Gateway allowed users to connect to it via a limited shell terminal (IGX). However, it was discovered that the process was running under root privileges. This allowed the attacker to read, write, and modify any file in the operating system by utilizing the limited shell file exec and download functions. By replacing the /etc/passwd file with a new root user entry, the attacker was able to breakout from the limited shell and login to a unrestricted shell with root access. With the root access, the attacker will be able take full control of the IIoT Gateway.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-32722 The Skylab IGX IIoT Gateway allowed users to connect to it via a limited shell terminal (IGX). However, it was discovered that the process was running under root privileges. This allowed the attacker to read, write, and modify any file in the operating system by utilizing the limited shell file exec and download functions. By replacing the /etc/passwd file with a new root user entry, the attacker was able to breakout from the limited shell and login to a unrestricted shell with root access. With the root access, the attacker will be able take full control of the IIoT Gateway.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GovTech CSG

Published:

Updated: 2024-08-01T20:33:52.410Z

Reserved: 2024-04-25T02:38:12.253Z

Link: CVE-2024-4163

cve-icon Vulnrichment

Updated: 2024-08-01T20:33:52.410Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-26T03:15:06.740

Modified: 2024-11-21T09:42:18.580

Link: CVE-2024-4163

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses