Lucene search

K
nvd[email protected]NVD:CVE-2024-21878
HistoryAug 12, 2024 - 1:38 p.m.

CVE-2024-21878

2024-08-1213:38:15
CWE-78
CWE-77
web.nvd.nist.gov
6
enphase iq gateway
command injection
os
vulnerability
envoy
unpatched

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

28.7%

Improper Neutralization of Special Elements used in a Command (‘Command Injection’) vulnerability in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection. This vulnerability is present in an internal script.This issue affects Envoy: from 4.x up to and including 8.x and is currently unpatched.

Affected configurations

Nvd
Node
enphaseiq_gateway_firmwareRange4.08.2.4225
AND
enphaseiq_gatewayMatch-
VendorProductVersionCPE
enphaseiq_gateway_firmware*cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:*
enphaseiq_gateway-cpe:2.3:h:enphase:iq_gateway:-:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

28.7%

Related for NVD:CVE-2024-21878