CVE-2024-3741
Vulnerability from cvelistv5
Published
2024-04-18 22:04
Modified
2024-08-01 20:20
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS score ?
Summary
Electrolink FM/DAB/TV Transmitter Authentication Bypass by Assumed-Immutable Data
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:electrolink:medium_dab_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "medium dab transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "2kW" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:uhf_tv_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "uhf tv transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "10W" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:high_power_dab_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "high power dab transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "5kW" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:compact_dab_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "compact dab transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "250W" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:compact_fm_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "compact fm transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "2kW" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:modular_fm_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "modular fm transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "30kW" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:digital_fm_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "digital fm transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "15W" } ] }, { "cpes": [ "cpe:2.3:a:electrolink:vhf_tv_transmitter:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "vhf tv transmitter", "vendor": "electrolink", "versions": [ { "status": "affected", "version": "BI" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-3741", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-29T18:54:30.103942Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:32:28.173Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:20:01.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-107-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact DAB Transmitter", "vendor": "Electrolink", "versions": [ { "status": "affected", "version": "10W" }, { "status": "affected", "version": "100W" }, { "status": "affected", "version": "250W" } ] }, { "defaultStatus": "unaffected", "product": "Medium DAB Transmitter", "vendor": "Electrolink", "versions": [ { "status": "affected", "version": "500W" }, { "status": "affected", "version": "1kW" }, { "status": "affected", "version": "2kW" } ] }, { "defaultStatus": "unaffected", "product": "High Power DAB Transmitter", "vendor": "Electrolink", "versions": [ { "status": "affected", "version": "2.5kW" }, { "status": "affected", "version": "3kW" }, { "status": "affected", "version": "4kW" }, { "status": "affected", "version": "5kW" } ] }, { "defaultStatus": "unaffected", "product": "Compact FM Transmitter", "vendor": "Electrolink", "versions": [ { "status": "affected", "version": "Compact FM Transmitter" }, { "status": "affected", "version": "500W" }, { "status": "affected", "version": "1kW" }, { "status": "affected", "version": "2kW" } ] }, { "defaultStatus": "unaffected", "product": "Modular FM Transmitter", "vendor": "Electrolink", "versions": [ { "status": "affected", "version": "3kW" }, { "status": "affected", "version": "5kW" }, { "status": "affected", "version": "10kW" }, { "status": "affected", "version": "15kW" }, { "status": "affected", "version": "20kW" }, { "status": "affected", "version": "30kW" } ] }, { "defaultStatus": "unaffected", "product": "Digital FM Transmitter", "vendor": "Electrolink", "versions": [ { "lessThanOrEqual": "40kW", "status": "affected", "version": "15W", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "VHF TV Transmitter", "vendor": "Electrolink", "versions": [ { "status": "affected", "version": "BI" }, { "status": "affected", "version": "BIII" } ] }, { "defaultStatus": "unaffected", "product": "UHF TV Transmitter", "vendor": "Electrolink", "versions": [ { "lessThanOrEqual": "5kW", "status": "affected", "version": "10W", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Gjoko Krstic publicly reported these vulnerabilities on the internet after an unsuccessful attempt to contact Electrolink directly." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Electrolink transmitters are vulnerable to an authentication bypass \nvulnerability affecting the login cookie. An attacker can set an \narbitrary value except \u0027NO\u0027 to the login cookie and have full system \naccess." } ], "value": "Electrolink transmitters are vulnerable to an authentication bypass \nvulnerability affecting the login cookie. An attacker can set an \narbitrary value except \u0027NO\u0027 to the login cookie and have full system \naccess." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-302", "description": "CWE-302", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-28T16:40:14.630Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-107-02" } ], "source": { "advisory": "ICSA-24-107-02", "discovery": "EXTERNAL" }, "title": "Electrolink FM/DAB/TV Transmitter Authentication Bypass by Assumed-Immutable Data", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Electrolink has not responded to requests to work with CISA to mitigate \nthese vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://electrolink.com/contacts/\"\u003eElectrolink\u003c/a\u003e for additional information.\n\n\u003cbr\u003e" } ], "value": "Electrolink has not responded to requests to work with CISA to mitigate \nthese vulnerabilities. Users of the affected products are encouraged to \ncontact Electrolink https://electrolink.com/contacts/ for additional information." } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2024-3741", "datePublished": "2024-04-18T22:04:46.300Z", "dateReserved": "2024-04-12T19:35:17.605Z", "dateUpdated": "2024-08-01T20:20:01.174Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-3741\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2024-04-18T22:15:10.603\",\"lastModified\":\"2024-05-28T17:15:11.327\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Electrolink transmitters are vulnerable to an authentication bypass \\nvulnerability affecting the login cookie. An attacker can set an \\narbitrary value except \u0027NO\u0027 to the login cookie and have full system \\naccess.\"},{\"lang\":\"es\",\"value\":\"Los transmisores Electrolink son afectados una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n que afecta la cookie de inicio de sesi\u00f3n. Un atacante puede establecer un valor arbitrario excepto \u0027NO\u0027 para la cookie de inicio de sesi\u00f3n y tener acceso completo al sistema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-302\"}]}],\"references\":[{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-24-107-02\",\"source\":\"ics-cert@hq.dhs.gov\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.