Critical Cloud Flaws Leave 50,000 Ruijie Devices Vulnerable to Remote Hijacking

Critical Cloud Flaws Leave 50,000 Ruijie Devices Vulnerable to Remote Hijacking

Critical Security Flaws Discovered in Ruijie Networks’ Cloud Platform

Security researchers at Claroty have uncovered multiple severe vulnerabilities in Ruijie Networks’ cloud management platform, affecting both the Reyee platform and Reyee OS network devices. The discovery includes 10 security flaws, with three rated as Critical, potentially impacting approximately 50,000 cloud-connected devices.

Critical Vulnerabilities:
– CVE-2024-47547 (CVSS 9.4): Weak password recovery mechanism vulnerable to brute force attacks
– CVE-2024-48874 (CVSS 9.8): Server-side request forgery vulnerability exposing internal cloud infrastructure
– CVE-2024-52324 (CVSS 9.8): Dangerous function allowing arbitrary OS command execution via MQTT messages

The researchers developed an attack dubbed “Open Sesame” (CVE-2024-47146), which enables unauthorized network access through nearby access points. Additionally, they discovered that device serial numbers could be exploited to:
– Break MQTT authentication
– Generate valid credentials for cloud-connected devices
– Execute malicious commands across connected devices
– Perform denial-of-service attacks

In a related development, PCAutomotive identified 12 vulnerabilities in Skoda cars’ MIB3 infotainment units, enabling potential attackers to:
– Execute code via Bluetooth
– Track vehicle location
– Record in-car conversations
– Access vehicle data
– Bypass secure boot systems

Ruijie Networks has addressed all identified vulnerabilities through cloud-based patches, requiring no user action. The discoveries highlight ongoing security challenges in IoT devices and connected vehicle systems.

Share This Article