Date of Disclosure: 6/27/2024
Affected Product: TimeProvider® 4100 Grandmaster
Exploitation of the vulnerability allows the attacker to execute arbitrary commands on the system if they have the right to upload new configurations.
Upgrade TimeProvider® 4100 grandmaster to the latest firmware.
As of the firmware release 2.4.7, parameter sanitization of the configuration parameters has been improved to not allow execution of unauthorized commands.
Reported by Armando Huesca Prida, Marco Negro, Antonio Carriero, Vito Pistillo, Davide Renna, Manuel Leone, Massimiliano Brolli and TIM Security Red Team Research.
It is strongly recommended that all customers upgrade TimeProvider® 4100 grandmaster to firmware version 2.4.7 or newer.
It is important to note that the web interface is only available on a physically separate management port and these vulnerabilities have no impact on the timing service ports. For added security, users have the option to disable the web interface, further protecting the device from potential web-based exploitations.