Skip to main content

CVE-2024-0554: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Full Compass Systems WIC1200

Medium
VulnerabilityCVE-2024-0554cvecve-2024-0554cwe-79
Published: Tue Jan 16 2024 (01/16/2024, 10:08:29 UTC)
Source: CVE Database V5
Vendor/Project: Full Compass Systems
Product: WIC1200

Description

A Cross-site scripting (XSS) vulnerability has been found on WIC1200, affecting version 1.1. An authenticated user could store a malicious javascript payload in the device model parameter via '/setup/diags_ir_learn.asp', allowing the attacker to retrieve the session details of another user.

AI-Powered Analysis

AILast updated: 07/03/2025, 16:13:37 UTC

Technical Analysis

CVE-2024-0554 is a Cross-site Scripting (XSS) vulnerability identified in the Full Compass Systems WIC1200 device, specifically affecting version 1.1. This vulnerability arises from improper neutralization of input during web page generation (CWE-79). An authenticated user can inject malicious JavaScript code into the 'device model' parameter via the '/setup/diags_ir_learn.asp' endpoint. Because the input is not properly sanitized, the malicious script is stored and subsequently executed in the context of other users accessing the affected page. This stored XSS can be exploited to steal session details of other users, potentially allowing attackers to hijack sessions and escalate privileges within the device's management interface. The vulnerability requires the attacker to have authenticated access to the device, and user interaction is necessary for the malicious payload to execute (i.e., another user must visit the affected page). The CVSS v3.1 base score is 5.5 (medium severity), reflecting network attack vector, low attack complexity, privileges required, user interaction needed, and impacts on confidentiality, integrity, and availability at a low level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because it targets a network-connected device management interface, which could be part of enterprise or industrial control environments, potentially exposing sensitive operational controls or data if exploited.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, especially for those using Full Compass Systems WIC1200 devices in their network infrastructure or industrial environments. Successful exploitation could lead to session hijacking, unauthorized access, and manipulation of device settings, potentially disrupting operations or leaking sensitive information. Given the device's role, attackers could pivot from compromised devices to broader network segments, increasing risk. The requirement for authenticated access somewhat limits exposure but insider threats or compromised credentials could facilitate exploitation. The medium severity score indicates moderate risk, but the potential for lateral movement and operational disruption elevates concern. Organizations in sectors such as manufacturing, logistics, or critical infrastructure that rely on these devices may face operational downtime or data breaches. Furthermore, the lack of available patches increases the window of vulnerability, necessitating immediate mitigation efforts.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict and monitor access to the WIC1200 management interface, ensuring only trusted and necessary personnel have authenticated access. 2) Employ strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 3) Conduct regular audits of device configurations and logs to detect unusual activity indicative of exploitation attempts. 4) Implement network segmentation to isolate the WIC1200 devices from broader enterprise networks, limiting attacker lateral movement. 5) Use web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) configured to detect and block suspicious input patterns targeting the vulnerable parameter. 6) Educate users with access to the device about the risks of XSS and safe browsing practices to minimize user interaction risks. 7) Monitor vendor communications for patches or updates and plan prompt deployment once available. 8) If possible, temporarily disable or restrict access to the vulnerable endpoint '/setup/diags_ir_learn.asp' until a patch is applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2024-01-15T08:35:58.380Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dc31f182aa0cae24a050d

Added to database: 6/2/2025, 3:28:31 PM

Last enriched: 7/3/2025, 4:13:37 PM

Last updated: 7/28/2025, 4:40:37 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats