CVE-2024-50370 (GCVE-0-2024-50370)

Vulnerability from cvelistv5 – Published: 2024-11-26 10:55 – Updated: 2024-11-26 14:19
VLAI?
Summary
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the "cfg_cmd_set_eth_conf" operation.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
Impacted products
Vendor Product Version
Advantech EKI-6333AC-2G Affected: 0 , ≤ <= 1.6.3 (semver)
Create a notification for this product.
    Advantech EKI-6333AC-2GD Affected: 0 , ≤ <= 1.6.3 (semver)
Create a notification for this product.
    Advantech EKI-6333AC-1GPO Affected: 0 , ≤ <= 1.2.1 (semver)
Create a notification for this product.
Credits
Diego Zaffaroni of Nozomi Networks found this bug during a security research activity.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:advantech:eki-6333ac-2g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "eki-6333ac-2g_firmware",
            "vendor": "advantech",
            "versions": [
              {
                "lessThanOrEqual": "1.6.3",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:advantech:eki-6333ac-2gd_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "eki-6333ac-2gd_firmware",
            "vendor": "advantech",
            "versions": [
              {
                "lessThanOrEqual": "1.6.3",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:advantech:eki-6333ac-1gpo_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "eki-6333ac-1gpo_firmware",
            "vendor": "advantech",
            "versions": [
              {
                "lessThanOrEqual": "1.2.1",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-50370",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-26T14:11:28.496361Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-26T14:19:26.395Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "EKI-6333AC-2G",
          "vendor": "Advantech",
          "versions": [
            {
              "lessThanOrEqual": "\u003c= 1.6.3",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EKI-6333AC-2GD",
          "vendor": "Advantech",
          "versions": [
            {
              "lessThanOrEqual": "\u003c= 1.6.3",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EKI-6333AC-1GPO",
          "vendor": "Advantech",
          "versions": [
            {
              "lessThanOrEqual": "\u003c= 1.2.1",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Zaffaroni of Nozomi Networks found this bug during a security research activity."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A CWE-78 \"Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (\u0026lt;= 1.6.3), EKI-6333AC-2GD (\u0026lt;= v1.6.3) and EKI-6333AC-1GPO (\u0026lt;= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default \"edgserver\" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the \"cfg_cmd_set_eth_conf\" operation."
            }
          ],
          "value": "A CWE-78 \"Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (\u003c= 1.6.3), EKI-6333AC-2GD (\u003c= v1.6.3) and EKI-6333AC-1GPO (\u003c= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default \"edgserver\" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the \"cfg_cmd_set_eth_conf\" operation."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-26T11:26:39.677Z",
        "orgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c",
        "shortName": "Nozomi"
      },
      "references": [
        {
          "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50370"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update affected products to the following firmware versions released by Advantech:\u003cbr\u003e- EKI-6333AC-2G: v1.6.5\u003cbr\u003e- EKI-6333AC-2GD: v1.6.5\u003cbr\u003e- EKI-6333AC-1GPO: v1.2.2"
            }
          ],
          "value": "Update affected products to the following firmware versions released by Advantech:\n- EKI-6333AC-2G: v1.6.5\n- EKI-6333AC-2GD: v1.6.5\n- EKI-6333AC-1GPO: v1.2.2"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c",
    "assignerShortName": "Nozomi",
    "cveId": "CVE-2024-50370",
    "datePublished": "2024-11-26T10:55:45.151Z",
    "dateReserved": "2024-10-23T07:55:58.311Z",
    "dateUpdated": "2024-11-26T14:19:26.395Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A CWE-78 \\\"Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\\\" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (\u003c= 1.6.3), EKI-6333AC-2GD (\u003c= v1.6.3) and EKI-6333AC-1GPO (\u003c= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default \\\"edgserver\\\" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the \\\"cfg_cmd_set_eth_conf\\\" operation.\"}, {\"lang\": \"es\", \"value\": \"Se descubri\\u00f3 una vulnerabilidad CWE-78 \\\"Neutralizaci\\u00f3n incorrecta de elementos especiales utilizados en un comando del SO (\u0027Inyecci\\u00f3n de comando del SO\u0027)\\\" que afecta a los siguientes dispositivos fabricados por Advantech: EKI-6333AC-2G (\u0026lt;= 1.6.3), EKI-6333AC-2GD (\u0026lt;= v1.6.3) y EKI-6333AC-1GPO (\u0026lt;= v1.2.1). La vulnerabilidad puede ser explotada por usuarios remotos no autenticados capaces de interactuar con el servicio \\\"edgserver\\\" predeterminado habilitado en el punto de acceso y se ejecutan comandos maliciosos con privilegios de superusuario. No hay autenticaci\\u00f3n habilitada en el servicio y la fuente de la vulnerabilidad reside en el c\\u00f3digo de procesamiento asociado a la operaci\\u00f3n \\\"cfg_cmd_set_eth_conf\\\".\"}]",
      "id": "CVE-2024-50370",
      "lastModified": "2024-11-26T11:22:05.563",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"prodsec@nozominetworks.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}]}",
      "published": "2024-11-26T11:22:05.563",
      "references": "[{\"url\": \"https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50370\", \"source\": \"prodsec@nozominetworks.com\"}]",
      "sourceIdentifier": "prodsec@nozominetworks.com",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"prodsec@nozominetworks.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-50370\",\"sourceIdentifier\":\"prodsec@nozominetworks.com\",\"published\":\"2024-11-26T11:22:05.563\",\"lastModified\":\"2024-11-26T11:22:05.563\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A CWE-78 \\\"Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\\\" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (\u003c= 1.6.3), EKI-6333AC-2GD (\u003c= v1.6.3) and EKI-6333AC-1GPO (\u003c= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default \\\"edgserver\\\" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the \\\"cfg_cmd_set_eth_conf\\\" operation.\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 una vulnerabilidad CWE-78 \\\"Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del SO (\u0027Inyecci\u00f3n de comando del SO\u0027)\\\" que afecta a los siguientes dispositivos fabricados por Advantech: EKI-6333AC-2G (\u0026lt;= 1.6.3), EKI-6333AC-2GD (\u0026lt;= v1.6.3) y EKI-6333AC-1GPO (\u0026lt;= v1.2.1). La vulnerabilidad puede ser explotada por usuarios remotos no autenticados capaces de interactuar con el servicio \\\"edgserver\\\" predeterminado habilitado en el punto de acceso y se ejecutan comandos maliciosos con privilegios de superusuario. No hay autenticaci\u00f3n habilitada en el servicio y la fuente de la vulnerabilidad reside en el c\u00f3digo de procesamiento asociado a la operaci\u00f3n \\\"cfg_cmd_set_eth_conf\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"prodsec@nozominetworks.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"prodsec@nozominetworks.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"references\":[{\"url\":\"https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50370\",\"source\":\"prodsec@nozominetworks.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…