Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33892: n/a

0
Medium
VulnerabilityCVE-2024-33892cvecve-2024-33892
Published: Fri Aug 02 2024 (08/02/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Insecure Permissions vulnerability in Cosy+ devices running a firmware 21.x below 21.2s10 or a firmware 22.x below 22.1s3 are susceptible to leaking information through cookies. This is fixed in version 21.2s10 and 22.1s3

AI-Powered Analysis

AILast updated: 11/04/2025, 17:10:53 UTC

Technical Analysis

CVE-2024-33892 is a vulnerability identified in Cosy+ devices, specifically those running firmware versions 21.x below 21.2s10 and 22.x below 22.1s3. The root cause is insecure permissions that allow unauthorized parties to leak information through cookies. Cookies, which typically store session identifiers or configuration data, can be accessed or manipulated due to improper access control settings. This vulnerability falls under CWE-281 (Improper Authentication), indicating that the device fails to properly restrict access to sensitive data. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network (AV:N, PR:N, UI:N). The impact primarily affects data integrity, as attackers may manipulate or glean information from cookies, but confidentiality and availability impacts are not directly indicated. The vendor has addressed the issue in firmware versions 21.2s10 and 22.1s3, and users are advised to upgrade accordingly. No public exploits have been reported, but the medium CVSS score (5.3) reflects the moderate risk posed by this vulnerability. The issue is particularly relevant for environments where Cosy+ devices are used for remote access or industrial control, as cookie-based information leakage could facilitate further attacks or unauthorized access.

Potential Impact

For European organizations, the vulnerability could lead to unauthorized access to sensitive session or configuration data stored in cookies on Cosy+ devices. This may enable attackers to manipulate device behavior or escalate privileges indirectly, potentially disrupting industrial processes or remote access systems. While the confidentiality impact is limited, integrity concerns could affect operational reliability and trustworthiness of device communications. Organizations in sectors such as manufacturing, energy, or critical infrastructure that rely on Cosy+ devices for secure remote connectivity are at higher risk. Exploitation could facilitate lateral movement or reconnaissance within networks, increasing the attack surface. The absence of known exploits reduces immediate risk, but the ease of exploitation without authentication means that unpatched devices remain vulnerable to opportunistic attackers. The impact on availability is minimal, but the integrity compromise could have cascading effects on dependent systems and processes.

Mitigation Recommendations

European organizations should immediately verify the firmware versions of all deployed Cosy+ devices and upgrade to at least version 21.2s10 or 22.1s3 as provided by the vendor. In addition to patching, administrators should audit cookie permissions and access controls on these devices to ensure that sensitive information is not exposed to unauthorized users. Network segmentation should be employed to isolate Cosy+ devices from untrusted networks, limiting exposure. Implement strict monitoring and logging of device access and cookie usage to detect anomalous behavior indicative of exploitation attempts. Where possible, disable unnecessary services or interfaces on Cosy+ devices to reduce attack vectors. Organizations should also review and enforce strong authentication and authorization policies around remote access infrastructure to mitigate risks stemming from this vulnerability. Finally, maintain an up-to-date inventory of affected devices and apply vendor security advisories promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-04-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2debf0ba78a050536ef1

Added to database: 11/4/2025, 4:46:35 PM

Last enriched: 11/4/2025, 5:10:53 PM

Last updated: 11/5/2025, 12:28:22 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats