CVE-2024-29862

Incorrect Access Control in chirpstack-mqtt-forwarder < v4.2.1 and chirpstack-gateway-bridge < v4.0.11

Incorrect Access Control in chirpstack-mqtt-forwarder < v4.2.1 and chirpstack-gateway-bridge < v4.0.11

Incorrect Access Control in chirpstack-mqtt-forwarder < v4.2.1 and chirpstack-gateway-bridge < v4.0.11

CVE ID
CVE-2024-29862
CVE Link
https://nvd.nist.gov/vuln/detail/CVE-2024-29862
Vendor
ChirpStack
Affected Product & Version

chirpstack-mqtt-forwarder < v4.2.1
chirpstack-gateway-bridge < v4.0.11

Vulnerability Type
Incorrect Access Control
CVSS Base Score / CVSS Vector

NVD: Awaiting Analysis
BDO: 5.3 Medium  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Author
Martin Weißbach
Date
2024-03-21

CVE Details

Description:

Due to a firewall misconfiguration, the Kerlink firewall of chirpstack-mqtt-forwarder and chirpstack-gateway-bridge wrongly accepts TCP packets when using specific TCP source ports. Since the TCP source port of a TCP packet is in control of an attacker, the firewall can be bypassed then setting the source port accordingly thus allowing access to services behind the firewall.

The issue affects chirpstack-mqtt-forwarder before version 4.2.1 and chirpstack-gateway-bridge before 4.0.11.


Remediation:

The issue is fixed in version 4.2.1 of chirpstack-mqtt-forwarder and  in version 4.0.11 of chirpstack-gateway-bridge. Still, there is no IPK available for chirpstack-gateway-bridge 4.0.11. The author of ChirpStack Orne Brocaar recommends to move to chirpstack-mqtt-forwarder instead. The installation instructions can be found in the references below.

References:


Timeline:

2024-03-08: Vulnerability reported to ChirpStack

2024-03-11: Vulnerability was fixed

2024-03-21: CVE published