CVE-2024-22179
Vulnerability from cvelistv5
Published
2024-04-18 22:06
Modified
2024-08-01 22:35
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS score ?
Summary
Electrolink FM/DAB/TV Transmitter Authentication Bypass by Assumed-Immutable Data
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:electrolink:compact_dab_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "compact dab transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "10w" }, { "status": "affected", "version": "100w" }, { "status": "affected", "version": "250w" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:medium_dab_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "medium dab transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "500w" }, { "status": "affected", "version": "1kw" }, { "status": "affected", "version": "2kw" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:high_power_dab_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "high power dab transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "2.5kw" }, { "status": "affected", "version": "3kw" }, { "status": "affected", "version": "4kw" }, { "status": "affected", "version": "5kw" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:compact_fm_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "compact fm transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "500w" }, { "status": "affected", "version": "1kw" }, { "status": "affected", "version": "2kw" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:modular_fm_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "modular fm transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "3kw" }, { "status": "affected", "version": "5kw" }, { "status": "affected", "version": "10kw" }, { "status": "affected", "version": "15kw" }, { "status": "affected", "version": "20kw" }, { "status": "affected", "version": "30kw" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:digital_fm_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "digital fm transmitter", "vendor": "electrolink", "versions": [ { "lessThanOrEqual": "40kw", "status": "affected", "version": "15w", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:vhf_tv_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "vhf tv transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "bi" }, { "status": "affected", "version": "biii" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:uhf_tv_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "uhf tv transmitter", "vendor": "electrolink", "versions": [ { "lessThanOrEqual": "5kw", "status": "affected", "version": "10w", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22179", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T14:46:38.775197Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-16T15:05:06.230Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-107-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact DAB Transmitter", "vendor": "Electrolink", "versions": [ { "status": "affected", "version": "10W" }, { "status": "affected", "version": "100W" }, { "status": "affected", "version": "250W" } ] }, { "defaultStatus": "unaffected", "product": "Medium DAB Transmitter", "vendor": "Electrolink", "versions": [ { "status": "affected", "version": "500W" }, { "status": "affected", "version": "1kW" }, { "status": "affected", "version": "2kW" } ] }, { "defaultStatus": "unaffected", "product": "High Power DAB Transmitter", "vendor": "Electrolink", "versions": [ { "status": "affected", "version": "2.5kW" }, { "status": "affected", "version": "3kW" }, { "status": "affected", "version": "4kW" }, { "status": "affected", "version": "5kW" } ] }, { "defaultStatus": "unaffected", "product": "Compact FM Transmitter", "vendor": "Electrolink", "versions": [ { "status": "affected", "version": "Compact FM Transmitter" }, { "status": "affected", "version": "500W" }, { "status": "affected", "version": "1kW" }, { "status": "affected", "version": "2kW" } ] }, { "defaultStatus": "unaffected", "product": "Modular FM Transmitter", "vendor": "Electrolink", "versions": [ { "status": "affected", "version": "3kW" }, { "status": "affected", "version": "5kW" }, { "status": "affected", "version": "10kW" }, { "status": "affected", "version": "15kW" }, { "status": "affected", "version": "20kW" }, { "status": "affected", "version": "30kW" } ] }, { "defaultStatus": "unaffected", "product": "Digital FM Transmitter", "vendor": "Electrolink", "versions": [ { "lessThanOrEqual": "40kW", "status": "affected", "version": "15W", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "VHF TV Transmitter", "vendor": "Electrolink", "versions": [ { "status": "affected", "version": "BI" }, { "status": "affected", "version": "BIII" } ] }, { "defaultStatus": "unaffected", "product": "UHF TV Transmitter", "vendor": "Electrolink", "versions": [ { "lessThanOrEqual": "5kW", "status": "affected", "version": "10W", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Gjoko Krstic publicly reported these vulnerabilities on the internet after an unsuccessful attempt to contact Electrolink directly." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The application is vulnerable to an unauthenticated parameter \nmanipulation that allows an attacker to set the credentials to blank \ngiving her access to the admin panel. Also vulnerable to account \ntakeover and arbitrary password change." } ], "value": "The application is vulnerable to an unauthenticated parameter \nmanipulation that allows an attacker to set the credentials to blank \ngiving her access to the admin panel. Also vulnerable to account \ntakeover and arbitrary password change." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-302", "description": "CWE-302", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-28T16:45:02.057Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-107-02" } ], "source": { "advisory": "ICSA-24-107-02", "discovery": "EXTERNAL" }, "title": "Electrolink FM/DAB/TV Transmitter Authentication Bypass by Assumed-Immutable Data", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Electrolink has not responded to requests to work with CISA to mitigate \nthese vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://electrolink.com/contacts/\"\u003eElectrolink\u003c/a\u003e for additional information.\n\n\u003cbr\u003e" } ], "value": "Electrolink has not responded to requests to work with CISA to mitigate \nthese vulnerabilities. Users of the affected products are encouraged to \ncontact Electrolink https://electrolink.com/contacts/ for additional information." } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2024-22179", "datePublished": "2024-04-18T22:06:26.781Z", "dateReserved": "2024-01-05T22:07:42.998Z", "dateUpdated": "2024-08-01T22:35:34.937Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-22179\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2024-04-18T22:15:09.850\",\"lastModified\":\"2024-05-28T17:15:09.547\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The application is vulnerable to an unauthenticated parameter \\nmanipulation that allows an attacker to set the credentials to blank \\ngiving her access to the admin panel. Also vulnerable to account \\ntakeover and arbitrary password change.\"},{\"lang\":\"es\",\"value\":\"La aplicaci\u00f3n es vulnerable a una manipulaci\u00f3n de par\u00e1metros no autenticados que permite a un atacante dejar las credenciales en blanco, d\u00e1ndole acceso al panel de administraci\u00f3n. Tambi\u00e9n vulnerable a la apropiaci\u00f3n de cuentas y al cambio arbitrario de contrase\u00f1a.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-302\"}]}],\"references\":[{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-24-107-02\",\"source\":\"ics-cert@hq.dhs.gov\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.