Lucene search

K
cvelistVulDBCVELIST:CVE-2024-7470
HistoryAug 05, 2024 - 4:00 a.m.

CVE-2024-7470 Raisecom MSG1200/MSG2100E/MSG2200/MSG2300 Web Interface vpn_template_style.php sslvpn_config_mod os command injection

2024-08-0504:00:09
CWE-78
VulDB
www.cve.org
7
cve-2024-7470
raisecom msg1200
raisecom msg2100e
raisecom msg2200
raisecom msg2300
web interface
os command injection

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CVSS4

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/SC:N/VI:L/SI:N/VA:L/SA:N

EPSS

0.017

Percentile

87.9%

A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. It has been rated as critical. This issue affects the function sslvpn_config_mod of the file /vpn/vpn_template_style.php of the component Web Interface. The manipulation of the argument template/stylenum leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273563. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CNA Affected

[
  {
    "vendor": "Raisecom",
    "product": "MSG1200",
    "versions": [
      {
        "version": "3.90",
        "status": "affected"
      }
    ],
    "modules": [
      "Web Interface"
    ]
  },
  {
    "vendor": "Raisecom",
    "product": "MSG2100E",
    "versions": [
      {
        "version": "3.90",
        "status": "affected"
      }
    ],
    "modules": [
      "Web Interface"
    ]
  },
  {
    "vendor": "Raisecom",
    "product": "MSG2200",
    "versions": [
      {
        "version": "3.90",
        "status": "affected"
      }
    ],
    "modules": [
      "Web Interface"
    ]
  },
  {
    "vendor": "Raisecom",
    "product": "MSG2300",
    "versions": [
      {
        "version": "3.90",
        "status": "affected"
      }
    ],
    "modules": [
      "Web Interface"
    ]
  }
]

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CVSS4

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/SC:N/VI:L/SI:N/VA:L/SA:N

EPSS

0.017

Percentile

87.9%

Related for CVELIST:CVE-2024-7470