Lucene search

K
cveDIVDCVE-2024-21879
HistoryAug 12, 2024 - 1:38 p.m.

CVE-2024-21879

2024-08-1213:38:15
CWE-77
CWE-78
DIVD
web.nvd.nist.gov
32
enphase iq gateway
command injection
cve-2024-21879
os commands
url parameter manipulation
enphase iq gateway v4.x to v8.x

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/SC:L/VI:H/SI:L/VA:H/SA:L/S:P/AU:Y/R:I/V:C/RE:H

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

28.7%

Improper Neutralization of Special Elements used in a Command (‘Command Injection’) vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.

Affected configurations

Nvd
Node
enphaseiq_gateway_firmwareRange4.08.2.4225
AND
enphaseiq_gatewayMatch-

CNA Affected

[
  {
    "vendor": "Enphase",
    "product": "Envoy",
    "versions": [
      {
        "status": "affected",
        "version": "8.x",
        "lessThan": "8.2.4225",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "7.x",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "6.x",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "5.x",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "4.x",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/SC:L/VI:H/SI:L/VA:H/SA:L/S:P/AU:Y/R:I/V:C/RE:H

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

28.7%

Related for CVE-2024-21879