CVE-2024-0554: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Full Compass Systems WIC1200
A Cross-site scripting (XSS) vulnerability has been found on WIC1200, affecting version 1.1. An authenticated user could store a malicious javascript payload in the device model parameter via '/setup/diags_ir_learn.asp', allowing the attacker to retrieve the session details of another user.
AI Analysis
Technical Summary
CVE-2024-0554 is a Cross-site Scripting (XSS) vulnerability identified in the Full Compass Systems WIC1200 device, specifically affecting version 1.1. This vulnerability arises from improper neutralization of input during web page generation (CWE-79). An authenticated user can inject malicious JavaScript code into the 'device model' parameter via the '/setup/diags_ir_learn.asp' endpoint. Because the input is not properly sanitized, the malicious script is stored and subsequently executed in the context of other users accessing the affected page. This stored XSS can be exploited to steal session details of other users, potentially allowing attackers to hijack sessions and escalate privileges within the device's management interface. The vulnerability requires the attacker to have authenticated access to the device, and user interaction is necessary for the malicious payload to execute (i.e., another user must visit the affected page). The CVSS v3.1 base score is 5.5 (medium severity), reflecting network attack vector, low attack complexity, privileges required, user interaction needed, and impacts on confidentiality, integrity, and availability at a low level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because it targets a network-connected device management interface, which could be part of enterprise or industrial control environments, potentially exposing sensitive operational controls or data if exploited.
Potential Impact
For European organizations, the impact of this vulnerability could be substantial, especially for those using Full Compass Systems WIC1200 devices in their network infrastructure or industrial environments. Successful exploitation could lead to session hijacking, unauthorized access, and manipulation of device settings, potentially disrupting operations or leaking sensitive information. Given the device's role, attackers could pivot from compromised devices to broader network segments, increasing risk. The requirement for authenticated access somewhat limits exposure but insider threats or compromised credentials could facilitate exploitation. The medium severity score indicates moderate risk, but the potential for lateral movement and operational disruption elevates concern. Organizations in sectors such as manufacturing, logistics, or critical infrastructure that rely on these devices may face operational downtime or data breaches. Furthermore, the lack of available patches increases the window of vulnerability, necessitating immediate mitigation efforts.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict and monitor access to the WIC1200 management interface, ensuring only trusted and necessary personnel have authenticated access. 2) Employ strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 3) Conduct regular audits of device configurations and logs to detect unusual activity indicative of exploitation attempts. 4) Implement network segmentation to isolate the WIC1200 devices from broader enterprise networks, limiting attacker lateral movement. 5) Use web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) configured to detect and block suspicious input patterns targeting the vulnerable parameter. 6) Educate users with access to the device about the risks of XSS and safe browsing practices to minimize user interaction risks. 7) Monitor vendor communications for patches or updates and plan prompt deployment once available. 8) If possible, temporarily disable or restrict access to the vulnerable endpoint '/setup/diags_ir_learn.asp' until a patch is applied.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2024-0554: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Full Compass Systems WIC1200
Description
A Cross-site scripting (XSS) vulnerability has been found on WIC1200, affecting version 1.1. An authenticated user could store a malicious javascript payload in the device model parameter via '/setup/diags_ir_learn.asp', allowing the attacker to retrieve the session details of another user.
AI-Powered Analysis
Technical Analysis
CVE-2024-0554 is a Cross-site Scripting (XSS) vulnerability identified in the Full Compass Systems WIC1200 device, specifically affecting version 1.1. This vulnerability arises from improper neutralization of input during web page generation (CWE-79). An authenticated user can inject malicious JavaScript code into the 'device model' parameter via the '/setup/diags_ir_learn.asp' endpoint. Because the input is not properly sanitized, the malicious script is stored and subsequently executed in the context of other users accessing the affected page. This stored XSS can be exploited to steal session details of other users, potentially allowing attackers to hijack sessions and escalate privileges within the device's management interface. The vulnerability requires the attacker to have authenticated access to the device, and user interaction is necessary for the malicious payload to execute (i.e., another user must visit the affected page). The CVSS v3.1 base score is 5.5 (medium severity), reflecting network attack vector, low attack complexity, privileges required, user interaction needed, and impacts on confidentiality, integrity, and availability at a low level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because it targets a network-connected device management interface, which could be part of enterprise or industrial control environments, potentially exposing sensitive operational controls or data if exploited.
Potential Impact
For European organizations, the impact of this vulnerability could be substantial, especially for those using Full Compass Systems WIC1200 devices in their network infrastructure or industrial environments. Successful exploitation could lead to session hijacking, unauthorized access, and manipulation of device settings, potentially disrupting operations or leaking sensitive information. Given the device's role, attackers could pivot from compromised devices to broader network segments, increasing risk. The requirement for authenticated access somewhat limits exposure but insider threats or compromised credentials could facilitate exploitation. The medium severity score indicates moderate risk, but the potential for lateral movement and operational disruption elevates concern. Organizations in sectors such as manufacturing, logistics, or critical infrastructure that rely on these devices may face operational downtime or data breaches. Furthermore, the lack of available patches increases the window of vulnerability, necessitating immediate mitigation efforts.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict and monitor access to the WIC1200 management interface, ensuring only trusted and necessary personnel have authenticated access. 2) Employ strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 3) Conduct regular audits of device configurations and logs to detect unusual activity indicative of exploitation attempts. 4) Implement network segmentation to isolate the WIC1200 devices from broader enterprise networks, limiting attacker lateral movement. 5) Use web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) configured to detect and block suspicious input patterns targeting the vulnerable parameter. 6) Educate users with access to the device about the risks of XSS and safe browsing practices to minimize user interaction risks. 7) Monitor vendor communications for patches or updates and plan prompt deployment once available. 8) If possible, temporarily disable or restrict access to the vulnerable endpoint '/setup/diags_ir_learn.asp' until a patch is applied.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2024-01-15T08:35:58.380Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683dc31f182aa0cae24a050d
Added to database: 6/2/2025, 3:28:31 PM
Last enriched: 7/3/2025, 4:13:37 PM
Last updated: 7/28/2025, 4:40:37 PM
Views: 10
Related Threats
CVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumCVE-2025-8929: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-8928: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-34154: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Synergetic Data Systems Inc. UnForm Server Manager
CriticalCVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.