CVE-2024-9644
Published: 04 February 2025
Summary
CVE-2024-9644 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Four-Faith F3X36 Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for all logical access, directly preventing unauthenticated modifications via the bapply.cgi administrative endpoint.
Explicitly identifies and restricts actions permitted without identification or authentication, ensuring no administrative functions like settings changes are accessible anonymously.
Requires timely identification, reporting, and correction of flaws such as this authentication bypass through firmware updates and configuration management.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authentication bypass in public-facing router web admin interface directly enables remote exploitation of the exposed application to gain unauthorized configuration access.
NVD Description
The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an authentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the "bapply.cgi" endpoint instead of the normal "apply.cgi" endpoint. A remote…
more
and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities.
Deeper analysisAI
CVE-2024-9644 is an authentication bypass vulnerability affecting the Four-Faith F3x36 router running firmware version 2.0.0. The flaw exists in the administrative web server, where authentication is not enforced for certain administrative functions when using the "bapply.cgi" endpoint instead of the standard "apply.cgi" endpoint. This issue, linked to CWE-306 and CWE-489, carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-02-04.
A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows the attacker to modify router settings arbitrarily. The vulnerability can also be chained with existing authenticated vulnerabilities to amplify impact.
The vulncheck advisory at https://vulncheck.com/advisories/four-faith-hidden-api provides further details on the issue, including potential mitigation steps.
Details
- CWE(s)