Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

RITTAL GmbH & Co. KG — Vulnerabilities & Security Advisories 3

Browse all 3 CVE security advisories affecting RITTAL GmbH & Co. KG. AI-powered Chinese analysis, POCs, and references for each vulnerability.

RITTAL GmbH & Co. KG specializes in industrial enclosures, climate control, and power distribution systems for manufacturing and IT infrastructure. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from web interfaces and default credentials. While no major public security incidents have been widely documented, their CVE history reflects common industrial control system risks. The company has addressed issues through firmware updates and access controls, though the persistent presence of vulnerabilities in legacy equipment remains a concern for organizations relying on their solutions for critical infrastructure protection.

Top products by RITTAL GmbH & Co. KG: IoT Interface & CMC III Processing Unit
CVE IDTitleCVSSSeverityPublished
CVE-2024-47945 Predictable Session ID — IoT Interface & CMC III Processing UnitCWE-340 8.2 -2024-10-15
CVE-2024-47944 Missing Protection Mechanism for Alternate Hardware Interface — IoT Interface & CMC III Processing UnitCWE-1299 6.8 -2024-10-15
CVE-2024-47943 Improper signature verification of firmware upgrade files — IoT Interface & CMC III Processing UnitCWE-347 9.8 -2024-10-15

This page lists every published CVE security advisory associated with RITTAL GmbH & Co. KG. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.