Browse all 3 CVE security advisories affecting RITTAL GmbH & Co. KG. AI-powered Chinese analysis, POCs, and references for each vulnerability.
RITTAL GmbH & Co. KG specializes in industrial enclosures, climate control, and power distribution systems for manufacturing and IT infrastructure. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from web interfaces and default credentials. While no major public security incidents have been widely documented, their CVE history reflects common industrial control system risks. The company has addressed issues through firmware updates and access controls, though the persistent presence of vulnerabilities in legacy equipment remains a concern for organizations relying on their solutions for critical infrastructure protection.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-47945 | Predictable Session ID — IoT Interface & CMC III Processing UnitCWE-340 | 8.2 | - | 2024-10-15 |
| CVE-2024-47944 | Missing Protection Mechanism for Alternate Hardware Interface — IoT Interface & CMC III Processing UnitCWE-1299 | 6.8 | - | 2024-10-15 |
| CVE-2024-47943 | Improper signature verification of firmware upgrade files — IoT Interface & CMC III Processing UnitCWE-347 | 9.8 | - | 2024-10-15 |
This page lists every published CVE security advisory associated with RITTAL GmbH & Co. KG. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.