Lucene search

K
vulnrichmentIcscertVULNRICHMENT:CVE-2024-41936
HistoryAug 08, 2024 - 7:27 p.m.

CVE-2024-41936 Vonets WiFi Bridges Path Traversal

2024-08-0819:27:19
CWE-22
icscert
github.com
3
vonets wifi bridges
path traversal
remote attack .

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:N/SI:N/VA:N/SA:N

AI Score

7.5

Confidence

Low

EPSS

0.001

Percentile

39.1%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

A directory traversal vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9
and prior, enables an unauthenticated remote attacker to read arbitrary
files and bypass authentication.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "var1200-h_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "var1200-l_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "var600-h_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11ac_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11g-500s_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vbg1200_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11s-5g_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11s_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "var11n-300_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11n-300_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11g_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vga-1000_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11g-300_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "vonets",
    "product": "vap11n-300_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "3.3.23.6.9"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:N/SI:N/VA:N/SA:N

AI Score

7.5

Confidence

Low

EPSS

0.001

Percentile

39.1%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-41936