The Riello NetMan 204 network communication card, integral to the control of Uninterruptible Power Supply (UPS) systems, has been found to have critical security vulnerabilities that leave it open to exploitation by cybercriminals. These weaknesses could allow unauthorized users to manipulate system settings and take over the device entirely. Among the most concerning vulnerabilities are a SQL injection flaw, identified as CVE-2024-8877, that allows attackers to modify data within three API endpoints, and an unauthenticated password reset issue, CVE-2024-8878, which can be exploited to reset login credentials without prior authentication.
The SQL injection vulnerability impacts three critical endpoints in the NetMan 204’s configuration: /cgi-bin/db_datalog_w.cgi, /cgi-bin/db_eventlog_w.cgi, and /cgi-bin/db_multimetr_w.cgi. Through these, attackers may modify sensitive data, potentially leading to altered device behavior and compromised data integrity. Meanwhile, the password reset flaw enables a remote attacker to obtain the device’s “netmanid” and use it to calculate a recovery code, resetting login credentials to “admin” without user consent. This essentially gives an attacker full administrative access to the UPS system.
Thomas Weber of CyberDanube highlights that this password reset flaw allows for a near-complete takeover of the NetMan 204 device. An attacker with such access could potentially manipulate or disable the UPS unit remotely, which poses a significant risk for facilities that rely on continuous power supplies, such as data centers, healthcare facilities, and industrial operations. In addition to service disruption, malicious access could result in substantial financial losses and risk to critical infrastructure that depends on uninterrupted power.
These vulnerabilities remain unpatched, creating ongoing risks for organizations using Riello UPS systems with the NetMan 204 card. Given the absence of official security fixes, experts recommend isolating the affected devices from critical network segments and restricting physical access. While these measures may mitigate some risk, the vulnerabilities underscore the need for rigorous security standards in industrial equipment, especially as organizations continue to adopt connected and automated solutions for critical infrastructure.
Reference: