GSD-2024-3741
Vulnerability from gsd - Updated: 2024-04-13 05:02Details
Electrolink transmitters are vulnerable to an authentication bypass
vulnerability affecting the login cookie. An attacker can set an
arbitrary value except 'NO' to the login cookie and have full system
access.
Aliases
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-3741"
],
"details": "Electrolink transmitters are vulnerable to an authentication bypass \nvulnerability affecting the login cookie. An attacker can set an \narbitrary value except \u0027NO\u0027 to the login cookie and have full system \naccess.\n\n",
"id": "GSD-2024-3741",
"modified": "2024-04-13T05:02:35.720347Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2024-3741",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Compact DAB Transmitter",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "10W"
},
{
"version_affected": "=",
"version_value": "100W"
},
{
"version_affected": "=",
"version_value": "250W"
}
]
}
},
{
"product_name": "Medium DAB Transmitter",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "500W"
},
{
"version_affected": "=",
"version_value": "1kW"
},
{
"version_affected": "=",
"version_value": "2kW"
}
]
}
},
{
"product_name": "High Power DAB Transmitter",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.5kW"
},
{
"version_affected": "=",
"version_value": "3kW"
},
{
"version_affected": "=",
"version_value": "4kW"
},
{
"version_affected": "=",
"version_value": "5kW "
}
]
}
},
{
"product_name": "Compact FM Transmitter",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Compact FM Transmitter"
},
{
"version_affected": "=",
"version_value": "500W"
},
{
"version_affected": "=",
"version_value": "1kW"
},
{
"version_affected": "=",
"version_value": "2kW "
}
]
}
},
{
"product_name": "Modular FM Transmitter",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "3kW"
},
{
"version_affected": "=",
"version_value": "5kW"
},
{
"version_affected": "=",
"version_value": "10kW"
},
{
"version_affected": "=",
"version_value": "15kW"
},
{
"version_affected": "=",
"version_value": "20kW"
},
{
"version_affected": "=",
"version_value": "30kW "
}
]
}
},
{
"product_name": "Digital FM Transmitter",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "15W ",
"version_value": "40kW "
}
]
}
},
{
"product_name": "VHF TV Transmitter",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "BI"
},
{
"version_affected": "=",
"version_value": "BIII "
}
]
}
},
{
"product_name": "UHF TV Transmitter",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "10W ",
"version_value": "5kW "
}
]
}
}
]
},
"vendor_name": "Electrolink "
}
]
}
},
"credits": [
{
"lang": "en",
"value": "Gjoko Krstic publicly reported these vulnerabilities on the internet after an unsuccessful attempt to contact Electrolink directly."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Electrolink transmitters are vulnerable to an authentication bypass \nvulnerability affecting the login cookie. An attacker can set an \narbitrary value except \u0027NO\u0027 to the login cookie and have full system \naccess.\n\n"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-302",
"lang": "eng",
"value": "CWE-302"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-107-02",
"refsource": "MISC",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-107-02"
}
]
},
"source": {
"advisory": "ICSA-24-107-02",
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\nElectrolink has not responded to requests to work with CISA to mitigate \nthese vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://electrolink.com/contacts/\"\u003eElectrolink\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
}
],
"value": "Electrolink has not responded to requests to work with CISA to mitigate \nthese vulnerabilities. Users of the affected products are encouraged to \ncontact Electrolink https://electrolink.com/contacts/ for additional information.\n\n"
}
]
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "Electrolink transmitters are vulnerable to an authentication bypass \nvulnerability affecting the login cookie. An attacker can set an \narbitrary value except \u0027NO\u0027 to the login cookie and have full system \naccess.\n\n"
}
],
"id": "CVE-2024-3741",
"lastModified": "2024-04-19T13:10:25.637",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
}
]
},
"published": "2024-04-18T22:15:10.603",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-107-02"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-302"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Primary"
}
]
}
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…