Lucene search

K
cvelistVulDBCVELIST:CVE-2024-7468
HistoryAug 05, 2024 - 3:00 a.m.

CVE-2024-7468 Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 Web Interface list_service_manage.php sslvpn_config_mod os command injection

2024-08-0503:00:09
CWE-78
VulDB
www.cve.org
2
raisecom
msg series
web interface
vulnerability
sslvpn
command injection

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CVSS4

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/SC:N/VI:L/SI:N/VA:L/SA:N

EPSS

0.017

Percentile

87.9%

A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been classified as critical. This affects the function sslvpn_config_mod of the file /vpn/list_service_manage.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273561 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CNA Affected

[
  {
    "vendor": "Raisecom",
    "product": "MSG1200",
    "versions": [
      {
        "version": "3.90",
        "status": "affected"
      }
    ],
    "modules": [
      "Web Interface"
    ]
  },
  {
    "vendor": "Raisecom",
    "product": "MSG2100E",
    "versions": [
      {
        "version": "3.90",
        "status": "affected"
      }
    ],
    "modules": [
      "Web Interface"
    ]
  },
  {
    "vendor": "Raisecom",
    "product": "MSG2200",
    "versions": [
      {
        "version": "3.90",
        "status": "affected"
      }
    ],
    "modules": [
      "Web Interface"
    ]
  },
  {
    "vendor": "Raisecom",
    "product": "MSG2300",
    "versions": [
      {
        "version": "3.90",
        "status": "affected"
      }
    ],
    "modules": [
      "Web Interface"
    ]
  }
]

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CVSS4

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/SC:N/VI:L/SI:N/VA:L/SA:N

EPSS

0.017

Percentile

87.9%

Related for CVELIST:CVE-2024-7468