Lucene search

K
vulnrichmentIcscertVULNRICHMENT:CVE-2024-39815
HistoryAug 08, 2024 - 7:33 p.m.

CVE-2024-39815 Vonets WiFi Bridges Improper Check or Handling of Exceptional Conditions

2024-08-0819:33:35
CWE-703
icscert
github.com
2
vonets
wifi bridges
denial of service
vulnerability

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

CVSS4

9.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Improper check or handling of exceptional conditions vulnerability
affecting Vonets

industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an unauthenticated
remote attacker to cause a denial of service. A specially-crafted
HTTP request to pre-authentication resources can crash the service.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "var1200-h_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "var1200-l_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "var600-h_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11ac_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11g-500s_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vbg1200_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11s-5g_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11s_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "var11n-300_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11n-300_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11g_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vga-1000_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11g-300_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11n-300_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

CVSS4

9.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-39815