Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-32384

CVE-2024-32384: Kerlink Gateway Information Disclosure

CVE-2024-32384 is an information disclosure vulnerability in Kerlink gateways running KerOS prior to version 5.10. The lack of HTTPS support enables man-in-the-middle attacks. This article covers technical details, affected versions, impact, and mitigation strategies.

Updated: January 22, 2026

CVE-2024-32384 Overview

CVE-2024-32384 is a medium-severity vulnerability affecting Kerlink gateways running KerOS prior to version 5.10. The vulnerability stems from the web interface being exposed exclusively over HTTP without HTTPS support, creating a significant transport layer security gap. This insecure communication channel allows man-in-the-middle (MITM) attackers to intercept and modify traffic between clients and the affected IoT gateway devices.

The vulnerability is classified under CWE-319 (Cleartext Transmission of Sensitive Information), which represents a fundamental failure to protect data in transit. In IoT gateway environments, this poses substantial risks as administrative credentials, configuration data, and potentially sensitive network information could be exposed to attackers positioned on the network path.

Critical Impact

Attackers can intercept administrative credentials and device configurations, potentially gaining full control over IoT gateway infrastructure through man-in-the-middle attacks.

Affected Products

  • Kerlink gateways running KerOS versions prior to 5.10
  • Kerlink IoT gateway devices with HTTP-only web interfaces
  • Network infrastructure utilizing vulnerable KerOS firmware

Discovery Timeline

  • 2025-12-01 - CVE CVE-2024-32384 published to NVD
  • 2025-12-02 - Last updated in NVD database

Technical Details for CVE-2024-32384

Vulnerability Analysis

This vulnerability carries a CVSS v3.1 score of 6.8 (Medium severity) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N. The scoring reflects:

  • Attack Vector (AV:N): Network-based exploitation requiring the attacker to be positioned to intercept traffic
  • Attack Complexity (AC:H): High complexity due to the need for man-in-the-middle positioning
  • Privileges Required (PR:N): No authentication needed to perform the attack
  • User Interaction (UI:R): Requires a legitimate user to access the web interface
  • Confidentiality Impact (C:H): High - sensitive data including credentials can be captured
  • Integrity Impact (I:H): High - traffic can be modified to inject malicious content

The EPSS (Exploit Prediction Scoring System) probability is 0.012% with a percentile of 1.29, indicating a relatively low likelihood of exploitation in the wild, though the impact remains significant for affected deployments.

Root Cause

The root cause of CVE-2024-32384 lies in the architectural decision to implement the device's web management interface using only unencrypted HTTP protocol. KerOS versions prior to 5.10 lack TLS/SSL certificate handling and HTTPS endpoint configuration, meaning all web traffic—including authentication requests, session tokens, and configuration changes—is transmitted in cleartext.

This design flaw is particularly concerning in IoT gateway deployments where:

  • Devices often operate on shared network segments
  • Administrative access may occur over untrusted networks
  • Gateway devices handle sensitive LoRaWAN or other IoT protocol configurations

Attack Vector

The attack exploits the cleartext transmission of sensitive data over HTTP. An attacker positioned on the same network segment or along the routing path between an administrator and the Kerlink gateway can:

  1. Passive Interception: Capture all HTTP traffic to extract usernames, passwords, session cookies, and device configurations
  2. Active Modification: Inject malicious JavaScript, alter configuration parameters, or redirect authentication flows
  3. Session Hijacking: Steal session tokens to impersonate legitimate administrators
  4. Credential Theft: Harvest login credentials transmitted in plaintext for future unauthorized access

The attack typically requires the adversary to perform ARP spoofing, DNS poisoning, or other network-level positioning techniques to intercept traffic destined for the gateway's web interface.

Detection Methods for CVE-2024-32384

Indicators of Compromise

  • Unexpected ARP table changes or ARP spoofing activity on network segments containing Kerlink gateways
  • Unencrypted HTTP traffic on port 80 to gateway management interfaces from unexpected sources
  • Multiple failed login attempts followed by successful authentication from different source IPs
  • Configuration changes to gateway devices that were not authorized or logged by administrators

Detection Strategies

Network monitoring should focus on identifying potential MITM positioning attempts and suspicious traffic patterns. Security teams should implement the following detection approaches:

Network Traffic Analysis: Monitor for HTTP traffic to Kerlink gateway management interfaces. Any administrative traffic over port 80 should be flagged for review, especially from external or untrusted network segments.

ARP Monitoring: Deploy ARP watch mechanisms to detect spoofing attempts that could indicate an attacker positioning for traffic interception.

Session Anomaly Detection: Track administrative sessions for geographic or IP address inconsistencies that might indicate session token theft.

Firmware Version Auditing: Regularly audit KerOS versions across the gateway fleet to identify devices running vulnerable firmware below 5.10.

Monitoring Recommendations

Organizations should implement continuous monitoring for:

  • HTTP traffic to IoT gateway management ports from non-administrative network segments
  • Certificate errors or TLS warnings when accessing gateway interfaces after upgrade
  • Unusual network topology changes in gateway-adjacent network segments
  • Authentication events from unexpected source addresses or at unusual times

How to Mitigate CVE-2024-32384

Immediate Actions Required

  • Upgrade all Kerlink gateways to KerOS version 5.10 or later, which includes HTTPS support
  • Isolate gateway management interfaces on dedicated, trusted network segments until patching is complete
  • Implement network-level encryption (VPN or IPsec) for any administrative access to vulnerable devices
  • Review access logs for signs of credential compromise or unauthorized configuration changes

Patch Information

Kerlink has addressed this vulnerability in KerOS version 5.10 and later by implementing HTTPS support for the web management interface. Organizations should consult the official Kerlink security advisory for detailed upgrade instructions:

  • Kerlink KerOS 5 Security Advisories
  • BDO Security Advisory - CVE-2024-32384

Firmware updates should be tested in a staging environment before deployment to production gateways to ensure compatibility with existing configurations.

Workarounds

For environments where immediate firmware upgrade is not feasible, the following workarounds can reduce exposure:

Network Segmentation: Restrict access to gateway management interfaces to dedicated management VLANs with strict access controls. This limits the attack surface by reducing the number of network paths where interception could occur.

VPN Tunneling: Require all administrative access to traverse an encrypted VPN tunnel, ensuring that even HTTP traffic is protected at the network layer.

Access Control Lists: Implement firewall rules that restrict management interface access to specific administrator IP addresses or subnets.

Physical Security: For critical deployments, consider physical network isolation of management interfaces to eliminate remote MITM opportunities.

bash
# Example: Network segmentation using iptables on a management host
# Restrict HTTP access to gateway management interface
iptables -A OUTPUT -p tcp --dport 80 -d <gateway_ip> -j DROP
# Force access through VPN tunnel interface only
iptables -A OUTPUT -o tun0 -p tcp --dport 80 -d <gateway_ip> -j ACCEPT

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechKerlink

  • SeverityMEDIUM

  • CVSS Score6.8

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityHigh
  • AvailabilityNone
  • CWE References
  • CWE-319
  • Technical References
  • Keros Docs Kerlink

  • Bdosecurity
  • Related CVEs
  • CVE-2024-32388: Kerlink KerOS Firewall Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English