Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55547: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in ORing IAP-420

0
Critical
VulnerabilityCVE-2024-55547cvecve-2024-55547cwe-77
Published: Tue Dec 10 2024 (12/10/2024, 16:27:07 UTC)
Source: CVE Database V5
Vendor/Project: ORing
Product: IAP-420

Description

SNMP objects in NET-SNMP used in ORing IAP-420 allows Command Injection. This issue affects IAP-420: through 2.01e.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:22:10 UTC

Technical Analysis

CVE-2024-55547 is a critical command injection vulnerability identified in the ORing IAP-420 device, specifically within its SNMP objects implemented using the NET-SNMP library. The vulnerability stems from CWE-77, which involves improper neutralization of special elements used in command execution contexts. In this case, the SNMP interface fails to properly sanitize input, allowing an unauthenticated remote attacker to inject and execute arbitrary system commands on the device. The affected product version is up to 2.01e, with no patches currently available. The vulnerability is remotely exploitable over the network without any authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects that the attack can be performed remotely with low complexity, no privileges, and no user interaction, resulting in high confidentiality, integrity, and availability impacts. Successful exploitation could allow attackers to take full control of the device, disrupt industrial operations, manipulate data, or use the compromised device as a foothold for lateral movement within critical infrastructure networks. Although no known exploits have been reported in the wild, the severity and ease of exploitation make this a significant threat. The ORing IAP-420 is commonly deployed in industrial automation and critical infrastructure environments, which increases the potential impact of this vulnerability.

Potential Impact

For European organizations, especially those operating in industrial automation, manufacturing, energy, transportation, and critical infrastructure sectors, this vulnerability poses a severe risk. Exploitation could lead to unauthorized command execution, resulting in operational disruption, data manipulation, or complete device takeover. This could cause downtime, safety hazards, and potential cascading failures in interconnected industrial systems. The confidentiality of sensitive operational data could be compromised, and integrity of control commands could be violated, leading to unsafe or unintended device behavior. Availability impacts could disrupt essential services, causing economic and reputational damage. Given the critical nature of industrial control systems in Europe’s energy grids, manufacturing plants, and transportation networks, the threat could have widespread consequences. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation if devices are exposed or insufficiently protected.

Mitigation Recommendations

1. Immediately isolate ORing IAP-420 devices from untrusted networks by implementing strict network segmentation and firewall rules to restrict SNMP access only to trusted management stations. 2. Disable SNMP services on the device if not required, or restrict SNMP community strings and access control lists (ACLs) to minimize exposure. 3. Monitor SNMP traffic for unusual or malformed requests indicative of exploitation attempts using intrusion detection/prevention systems (IDS/IPS) tailored for industrial protocols. 4. Implement strict network monitoring and logging to detect anomalous command execution or unexpected device behavior. 5. Engage with ORing support and vendors for firmware updates or patches as they become available, and plan for timely deployment. 6. Conduct thorough asset inventories to identify all affected devices and prioritize remediation efforts. 7. Employ compensating controls such as multi-factor authentication for network access and enhanced physical security to reduce attack surface. 8. Train operational technology (OT) security teams on this vulnerability and response procedures to ensure rapid detection and containment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CyberDanube
Date Reserved
2024-12-07T13:23:43.004Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6909325735043901e8309914

Added to database: 11/3/2025, 10:53:11 PM

Last enriched: 11/3/2025, 11:22:10 PM

Last updated: 11/5/2025, 8:39:59 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats