Intelight X-1L Traffic controller Maxtime 1.9.6 - Remote Code Execution (RCE)

Exploit Author: Andrew Lemon/Red Threat Analysis Author: www.bubbleslearn.ir Category: WebApps Language: Unknown Published Date: 2025-04-09
# Exploit Title: Intelight X-1L Traffic controller Maxtime 1.9.6 - Remote Code Execution (RCE)
# Google Dork: N/A
# Date: 07/09/2024
# Exploit Author: Andrew Lemon/Red Threat https://redthreatsec.com
# Vendor Homepage: https://www.q-free.com
# Software Link: N/A
# Version: 1.9
# Tested on:  (Intelight x-1) Linux 3.14.57 
# CVE : CVE-2024-38944

## Vulnerability Description
This vulnerability allows remote attackers to bypass authentication on affected installations of MaxTime Database Editor. 
Authentication is not required to exploit this vulnerability.

The specific flaw exists within the web-based UI on Traffic Controllers running version 1.9.x firmware. 
The issue results from the lack of authentication prior to allowing access to functionality. 
An attacker can leverage this vulnerability to gain full control of Intelight Traffic Controllers and modify the configuration of a traffic intersection,
modify traffic light sequences, or trigger the intersection to go into 4 way flash causing a denial of service and causing traffic congestion.

## Steps to Reproduce

Navigate to the IP address of an identified controller
When prompted for authentication append /cgi-bin/generateForm.cgi?formID=142 to the end of the IP address
Under the web security tab change the drop down from enabled to disabled and select apply or take note of the username and password and login with those.


Intelight X‑1L / MaxTime 1.9.6 — CVE‑2024‑38944: Remote Code Execution (RCE) — Analysis, Impact, and Mitigation

Executive summary

Intelight X‑1L traffic controllers running Maxtime firmware 1.9.x are impacted by CVE‑2024‑38944, a serious vulnerability in the web management interface that can allow remote attackers to bypass authentication and perform privileged operations. Successful exploitation can enable complete control of the controller, modification of signal timing/configuration, or forcing an intersection into fail modes (for example, 4‑way flash), resulting in safety and traffic‑flow disruptions. This article summarizes the technical aspects at a high level, the likely impacts, detection approaches, and recommended mitigations and operational controls for defenders and administrators.

Vulnerability overview (high level)

The flaw exists in the device's web UI layer. Due to insufficient enforcement of authentication checks before exposing administrative functionality, certain web requests may return privileged pages or accept configuration changes without requiring valid credentials. This is a privilege‑escalation / authentication‑bypass class of issue that can lead to remote code execution or configuration manipulation when combined with other components on the device.

Affected products and CVE

  • Product family: Intelight traffic controllers using Maxtime firmware
  • Affected versions: Maxtime 1.9.x (as reported)
  • Representative device: Intelight X‑1L
  • CVE identifier: CVE‑2024‑38944
  • Vendor: Q-Free / Intelight (check vendor advisory for exact affected builds and fixed versions)

Risk and potential impact

  • Operational disruption: Attackers can alter signal phasing/timing and force fail modes (e.g., 4‑way flash), producing congestion and potentially unsafe traffic conditions.
  • Safety and public risk: Misconfigured signals increase accident risk and can endanger emergency vehicle routing.
  • Critical‑infrastructure impact: Traffic controllers are part of municipal infrastructure; large‑scale compromise could produce wide area disruption.
  • Persistence and lateral movement: Compromised controllers may enable pivoting into back‑end management networks if not properly segmented.

Technical analysis (non‑actionable)

At a technical level, the root cause is the lack of proper authentication and authorization checks in the web management stack for specific administrative form handlers and CGI endpoints. When administrative functions are reachable without validating session state or credentials, attackers can submit configuration changes or invoke privileged operations. Combined with default or weak credentials and remote management exposure, the risk is heightened.

This class of vulnerability is typically exploited by sending crafted HTTP requests to administrative endpoints; defenders should assume that automated scanners may enumerate vulnerable devices once public disclosure occurs.

Detection and indicators of compromise (defensive guidance)

Focus on identifying unauthenticated access to administrative endpoints, unusual configuration change events, and traffic that indicates remote access to devices that should not be reachable from the Internet.

  • Network indicators:
    • Unexpected inbound HTTP/S requests to traffic controllers from untrusted Internet IPs.
    • Large numbers of GET/POST requests against administrative CGI or management paths.
    • Unusual outbound connections from controllers to unknown hosts (indicator of beaconing or exfiltration).
  • Host indicators:
    • Configuration change logs showing administrative actions with no associated authenticated session.
    • New or modified configuration files, unexpected reboots, or failed process restarts.
    • CLI or local logs showing unknown users or unexpected privilege escalations.

Sample defensive detection queries (examples)

Below are defensive example queries you can adapt for your SIEM. Replace tokens such as sourcetypes, index names, and URI filters with values suited to your environment. These examples are for detection, not exploitation.

-- Splunk example (adapt indexes and field names for your environment)
index=web_access sourcetype=access_combined
| search uri_path="/cgi-bin/*" OR uri_path="/admin/*"
| stats count, values(status) by src_ip, uri_path, user_agent
| where count > 5

Explanation: This Splunk search looks for repeated access to common administrative URI patterns and groups by source IP. Investigate source IPs that repeatedly access admin endpoints, especially from external networks.

-- Generic IDS rule template (conceptual)
alert tcp any any -> $HOSTS_HTTP any (msg:"Suspicious admin endpoint access"; flow:to_server,established; content:"/cgi-bin/"; http_uri; threshold: type threshold, track by_src, count 5, seconds 60; sid:9000001; rev:1;)

Explanation: This conceptual IDS rule flags multiple hits to CGI paths in a short time window. Tuning is required to avoid false positives; use in combination with allowlists and network context.

Mitigation and remediation

Apply the following prioritized actions immediately. Treat controllers as critical infrastructure and apply change control and testing where required.

  • Patch: Apply vendor‑supplied firmware updates or hotfixes as soon as available. Patching the firmware to a vendor‑released fixed version is the primary remediation.
  • Access control: Restrict management interfaces to trusted networks only (management VLANs, L3 ACLs). Do not expose controllers directly to the Internet.
  • Authentication hardening: Enforce strong, unique credentials for device administration; change default passwords and disable unused accounts.
  • Network segmentation: Place controllers behind firewalls and segregate them from general corporate or administrative networks. Use jump hosts or VPNs for admin access.
  • Web application protections: Deploy web application firewalls (WAF) or rule sets that detect and block abnormal administrative requests to CGI/management endpoints.
  • Monitoring and logging: Ensure detailed audit logging for configuration changes, and forward logs to a central SIEM for timely analysis and alerting.
  • Compensating controls: If patching cannot be immediate, block HTTP/S access to management interfaces at the network edge, or apply strict ACLs limiting source subnets.

Operational and network controls

  • Least privilege: Only grant administrative privileges to named operator accounts; do not use shared credentials.
  • Secure remote access: Require multi‑factor authentication for remote management and use encrypted tunnels (IPsec/VPN) with strong endpoint controls.
  • Change management: Record and verify all controller configuration changes; use signed configuration packages where supported.
  • Inventory and discovery: Maintain an up‑to‑date asset inventory of traffic controllers and their firmware versions; proactively identify exposed units.

Incident response and forensic considerations

If you suspect a controller has been targeted or compromised:

  • Isolate the device from untrusted networks while preserving logs and volatile evidence.
  • Capture full configuration backups and system logs (web server logs, syslog, process lists) before rebooting or applying changes.
  • Look for indicators described above: unauthorized configuration changes, unexpected admin sessions, unusual process activity, or persistence artifacts.
  • Engage vendor support and, if appropriate, local authorities; treat as critical infrastructure incident if public safety is impacted.

Responsible disclosure and vendor coordination

When vulnerabilities affecting public safety infrastructure are discovered, coordinate with the vendor and follow responsible disclosure. Work with the vendor to obtain a timeline for patch availability and request mitigation guidance for affected deployments. If you are an asset owner, subscribe to vendor advisories or government CERT notifications for updates.

Recommendations for vendors

  • Implement strict authentication and authorization checks for all management endpoints by default, and enforce session validation server‑side.
  • Harden the web management stack: remove unused CGI handlers and minimize exposed functionality.
  • Adopt secure development lifecycle practices including code reviews, automated scanning, and fuzz testing for device web interfaces.
  • Provide clear upgrade and rollback procedures and publish IOCs and mitigations to help customers respond quickly to disclosed issues.

Conclusion and next steps for defenders

CVE‑2024‑38944 represents a high‑risk issue for traffic signal infrastructure. Administrators should prioritize patching and hardening of affected devices, restrict network exposure of management interfaces, and enable monitoring to quickly detect abuse. Coordination with the vendor and careful incident response planning is essential to reduce public‑safety and operational impacts.

References and further reading

  • Vendor security advisories (consult your vendor for the official advisory and firmware updates)
  • Infrastructure security best practices: network segmentation, MFA for device management, central logging and alerting
  • Public CVE entry: search CVE‑2024‑38944 for canonical metadata and references