CVE-2024-2413
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Tags
Description
Intumit SmartRobot uses a fixed encryption key for authentication. Remote attackers can use this key to encrypt a string composed of the user's name and timestamp to generate an authentication code. With this authentication code, they can obtain administrator privileges and subsequently execute arbitrary code on the remote server using built-in system functionality.
Analysis
A critical authentication bypass vulnerability exists in Intumit SmartRobot due to the use of a hard-coded encryption key. Remote unauthenticated attackers can leverage this fixed key to forge authentication tokens by encrypting user credentials and timestamps, gaining full administrative access to the system. Once authenticated, attackers can execute arbitrary code on the server through built-in system functionality, achieving complete system compromise.
Technical Context
The vulnerability affects Intumit SmartRobot, an automation or robotic control system, across all versions according to the CPE identifier (cpe:2.3:a:intumit:smartrobot:*:*:*:*:*:*:*:*). The root cause is CWE-321 (Use of Hard-coded Cryptographic Key), a severe design flaw where cryptographic keys are embedded directly in the application code rather than being securely generated and managed. This implementation fundamentally breaks the authentication security model as the same key is shared across all installations, allowing anyone who discovers or reverse-engineers the key to forge valid authentication tokens.
Affected Products
Intumit SmartRobot is affected across all versions based on the CPE identifier (cpe:2.3:a:intumit:smartrobot:*:*:*:*:*:*:*:*), with no specific version restrictions indicated. The vulnerability was reported by the Taiwan Computer Emergency Response Team (TWCERT) with additional details available at https://www.twcert.org.tw/tw/cp-132-7697-ecf10-1.html. No vendor security advisory or patch information is currently referenced in the available intelligence sources.
Remediation
No patch or fixed version information is currently available based on the provided intelligence sources. Organizations using Intumit SmartRobot should immediately implement network segmentation to isolate affected systems from untrusted networks and restrict access to authorized IP addresses only. Contact Intumit directly for patch availability and monitor the TWCERT advisory at https://www.twcert.org.tw/tw/cp-132-7697-ecf10-1.html for updates. Consider disabling the affected systems if they are not mission-critical until a security update becomes available, as the authentication bypass cannot be mitigated through configuration changes alone.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today