Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33895: n/a

0
Medium
VulnerabilityCVE-2024-33895cvecve-2024-33895
Published: Fri Aug 02 2024 (08/02/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Cosy+ devices running a firmware 21.x below 21.2s10 or a firmware 22.x below 22.1s3 use a unique key to encrypt the configuration parameters. This is fixed in version 21.2s10 and 22.1s3, the key is now unique per device.

AI-Powered Analysis

AILast updated: 11/04/2025, 17:11:45 UTC

Technical Analysis

CVE-2024-33895 is a vulnerability identified in Cosy+ devices, which are commonly used in industrial and automation environments. The flaw exists in firmware versions 21.x below 21.2s10 and 22.x below 22.1s3, where configuration parameters are encrypted using a single, device-independent key. This means that the same encryption key is reused across multiple devices, violating best practices for cryptographic key management (CWE-798). An attacker with network access to a vulnerable device can potentially decrypt sensitive configuration data, which may include credentials, network settings, or operational parameters. This exposure compromises confidentiality and can lead to integrity and availability issues if attackers modify configurations or disrupt device operations. The vulnerability requires no privileges and only limited user interaction, increasing the risk of exploitation. The vendor addressed this issue by introducing unique per-device encryption keys in firmware versions 21.2s10 and 22.1s3, effectively isolating each device's configuration data. Although no public exploits are currently known, the medium CVSS score of 6.6 reflects the significant impact on confidentiality, integrity, and availability, combined with the relatively low complexity of attack. Organizations relying on Cosy+ devices should assess their firmware versions and apply updates promptly to mitigate this risk.

Potential Impact

For European organizations, particularly those in industrial automation, energy, and critical infrastructure sectors, this vulnerability poses a significant risk. Unauthorized decryption of configuration parameters can lead to exposure of sensitive information such as network credentials and operational settings, enabling attackers to manipulate device behavior or disrupt services. This can result in operational downtime, safety hazards, and potential regulatory non-compliance under frameworks like NIS2 and GDPR if sensitive data is exposed. The medium severity rating indicates a moderate but tangible threat, especially in environments where Cosy+ devices are integral to control systems. The requirement for network access means that organizations with poorly segmented or exposed networks are at higher risk. Given the strategic importance of industrial control systems in countries like Germany, France, and the UK, the impact could extend to national critical infrastructure, affecting energy distribution, manufacturing, and transportation sectors.

Mitigation Recommendations

1. Immediate firmware upgrade to versions 21.2s10 or 22.1s3 or later to ensure unique per-device encryption keys are used. 2. Implement strict network segmentation to isolate Cosy+ devices from general IT networks and limit access to trusted personnel and systems only. 3. Employ strong network access controls, including VPNs and multi-factor authentication, to reduce unauthorized access risk. 4. Regularly audit device configurations and monitor network traffic for unusual access patterns or attempts to retrieve configuration data. 5. Establish incident response procedures specific to industrial control system vulnerabilities, including rapid patch deployment and rollback plans. 6. Coordinate with device vendors for timely security updates and advisories. 7. Train operational technology (OT) staff on the importance of firmware updates and secure device management practices. 8. Consider deploying intrusion detection systems tailored for industrial protocols to detect exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-04-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2debf0ba78a050536f00

Added to database: 11/4/2025, 4:46:35 PM

Last enriched: 11/4/2025, 5:11:45 PM

Last updated: 11/5/2025, 2:15:26 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats