Lucene search

K
vulnrichmentIcscertVULNRICHMENT:CVE-2024-39791
HistoryAug 08, 2024 - 7:36 p.m.

CVE-2024-39791 Vonets WiFi Bridges Stack-based Buffer Overflow

2024-08-0819:36:17
CWE-121
icscert
github.com
5
vonets
wifi bridges
buffer overflow
cve-2024-39791
industrial
software versions
remote attack

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS4

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

AI Score

7.9

Confidence

Low

EPSS

0.001

Percentile

38.5%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Stack-based buffer overflow vulnerabilities affecting Vonets

industrial wifi bridge relays and wifi bridge repeaters, software versions
3.3.23.6.9 and prior, enable an unauthenticated remote attacker to
execute arbitrary code.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "var1200-h_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "var1200-l_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "var600-h_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11ac_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11g-500s_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vbg1200_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11s-5g_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11s_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "var11n-300_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11n-300_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11g_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vga-1000_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11g-300_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11n-300_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS4

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

AI Score

7.9

Confidence

Low

EPSS

0.001

Percentile

38.5%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-39791