Lucene search

K
nvd[email protected]NVD:CVE-2024-21879
HistoryAug 12, 2024 - 1:38 p.m.

CVE-2024-21879

2024-08-1213:38:15
CWE-78
CWE-77
web.nvd.nist.gov
3
command injection
enphase iq gateway
os command

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

28.7%

Improper Neutralization of Special Elements used in a Command (‘Command Injection’) vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.

Affected configurations

Nvd
Node
enphaseiq_gateway_firmwareRange4.08.2.4225
AND
enphaseiq_gatewayMatch-
VendorProductVersionCPE
enphaseiq_gateway_firmware*cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:*
enphaseiq_gateway-cpe:2.3:h:enphase:iq_gateway:-:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

28.7%

Related for NVD:CVE-2024-21879