-
Notifications
You must be signed in to change notification settings - Fork 206
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- 2 new CVEs: CVE-2024-11665, CVE-2024-11666 - 1 updated CVEs: CVE-2024-9621
- Loading branch information
cvelistV5 Github Action
committed
Nov 24, 2024
1 parent
b4892cb
commit 43f5e45
Showing
5 changed files
with
291 additions
and
9 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,121 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-11665", | ||
"assignerOrgId": "2d533b80-6e4a-4e20-93e2-171235122846", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "ONEKEY", | ||
"dateReserved": "2024-11-24T22:27:15.904Z", | ||
"datePublished": "2024-11-24T22:32:43.427Z", | ||
"dateUpdated": "2024-11-24T22:32:43.427Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"affected": [ | ||
{ | ||
"defaultStatus": "unaffected", | ||
"product": "cph2_echarge_firmware", | ||
"vendor": "hardy-barth", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "2.0.4", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"type": "finder", | ||
"value": "Quentin Kaiser from ONEKEY Research Labs" | ||
} | ||
], | ||
"datePublic": "2024-11-24T07:00:00.000Z", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in hardy-barth cph2_echarge_firmware allows OS Command Injection.<p>This issue affects cph2_echarge_firmware: through 2.0.4.</p>" | ||
} | ||
], | ||
"value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in hardy-barth cph2_echarge_firmware allows OS Command Injection.This issue affects cph2_echarge_firmware: through 2.0.4." | ||
} | ||
], | ||
"impacts": [ | ||
{ | ||
"capecId": "CAPEC-88", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "CAPEC-88 OS Command Injection" | ||
} | ||
] | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"cvssV3_1": { | ||
"attackComplexity": "LOW", | ||
"attackVector": "ADJACENT_NETWORK", | ||
"availabilityImpact": "HIGH", | ||
"baseScore": 8.8, | ||
"baseSeverity": "HIGH", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"privilegesRequired": "NONE", | ||
"scope": "UNCHANGED", | ||
"userInteraction": "NONE", | ||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", | ||
"version": "3.1" | ||
}, | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
] | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-77", | ||
"description": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "2d533b80-6e4a-4e20-93e2-171235122846", | ||
"shortName": "ONEKEY", | ||
"dateUpdated": "2024-11-24T22:32:43.427Z" | ||
}, | ||
"references": [ | ||
{ | ||
"tags": [ | ||
"third-party-advisory" | ||
], | ||
"url": "https://www.onekey.com/resource/not-all-ev-chargers-are-created-equal" | ||
} | ||
], | ||
"source": { | ||
"discovery": "UNKNOWN" | ||
}, | ||
"title": "Unauthenticated Remote Command Injection", | ||
"x_generator": { | ||
"engine": "Vulnogram 0.2.0" | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,121 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-11666", | ||
"assignerOrgId": "2d533b80-6e4a-4e20-93e2-171235122846", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "ONEKEY", | ||
"dateReserved": "2024-11-24T22:27:19.421Z", | ||
"datePublished": "2024-11-24T22:36:59.989Z", | ||
"dateUpdated": "2024-11-24T22:36:59.989Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"affected": [ | ||
{ | ||
"defaultStatus": "unaffected", | ||
"product": "cph2_echarge_firmware", | ||
"vendor": "hardy-barth", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "2.0.4", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"type": "finder", | ||
"value": "Quentin Kaiser from ONEKEY Research Labs" | ||
} | ||
], | ||
"datePublic": "2024-11-24T07:00:00.000Z", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "Affected devices beacon to eCharge cloud infrastructure asking if there are any command they should run. This communication is established over an insecure channel since peer verification is disabled everywhere. Therefore, remote unauthenticated users suitably positioned on the network between an EV charger controller and eCharge infrastructure can execute arbitrary commands with elevated privileges on affected devices.<br><br><p>This issue affects cph2_echarge_firmware: through 2.0.4.</p>" | ||
} | ||
], | ||
"value": "Affected devices beacon to eCharge cloud infrastructure asking if there are any command they should run. This communication is established over an insecure channel since peer verification is disabled everywhere. Therefore, remote unauthenticated users suitably positioned on the network between an EV charger controller and eCharge infrastructure can execute arbitrary commands with elevated privileges on affected devices.\n\nThis issue affects cph2_echarge_firmware: through 2.0.4." | ||
} | ||
], | ||
"impacts": [ | ||
{ | ||
"capecId": "CAPEC-88", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "CAPEC-88 OS Command Injection" | ||
} | ||
] | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"cvssV3_1": { | ||
"attackComplexity": "HIGH", | ||
"attackVector": "NETWORK", | ||
"availabilityImpact": "HIGH", | ||
"baseScore": 9, | ||
"baseSeverity": "CRITICAL", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"privilegesRequired": "NONE", | ||
"scope": "CHANGED", | ||
"userInteraction": "NONE", | ||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", | ||
"version": "3.1" | ||
}, | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
] | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-345", | ||
"description": "CWE-345 Insufficient Verification of Data Authenticity", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "2d533b80-6e4a-4e20-93e2-171235122846", | ||
"shortName": "ONEKEY", | ||
"dateUpdated": "2024-11-24T22:36:59.989Z" | ||
}, | ||
"references": [ | ||
{ | ||
"tags": [ | ||
"third-party-advisory" | ||
], | ||
"url": "https://www.onekey.com/resource/not-all-ev-chargers-are-created-equal" | ||
} | ||
], | ||
"source": { | ||
"discovery": "UNKNOWN" | ||
}, | ||
"title": "Unauthenticated Remote Command Injection in eCharge Salia PLCC", | ||
"x_generator": { | ||
"engine": "Vulnogram 0.2.0" | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters