cvelist/2024/4xxx/CVE-2024-4999.json
2024-05-16 13:00:35 +00:00

126 lines
5.0 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-4999",
"ASSIGNER": "research@onekey.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the web-based management interface of multiple Ligowave devices could allow an authenticated remote\u00a0attacker to execute arbitrary commands with elevated privileges.This issue affects UNITY: through 6.95-2; PRO: through 6.95-1.Rt3883; MIMO: through 6.95-1.Rt2880; APC Propeller: through 2-5.95-4.Rt3352."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')",
"cweId": "CWE-77"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Ligowave",
"product": {
"product_data": [
{
"product_name": "UNITY",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0",
"version_value": "6.95-2"
}
]
}
},
{
"product_name": "PRO",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0",
"version_value": "6.95-1.rt3883"
}
]
}
},
{
"product_name": "MIMO",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0",
"version_value": "6.95-1.rt2880"
}
]
}
},
{
"product_name": "APC Propeller",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0",
"version_value": "2-5.95-4.rt3352"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://onekey.com/blog/security-advisory-remote-code-execution-in-ligowave-devices/",
"refsource": "MISC",
"name": "https://onekey.com/blog/security-advisory-remote-code-execution-in-ligowave-devices/"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This product being EOL, Ligowave will not patch the vulnerability. If replacement of the EOL device is not possible, ensure access to the administration interface is restricted to administration network zones only, to reduce likelihood of exploitation."
}
],
"value": "This product being EOL, Ligowave will not patch the vulnerability. If replacement of the EOL device is not possible, ensure access to the administration interface is restricted to administration network zones only, to reduce likelihood of exploitation."
}
],
"credits": [
{
"lang": "en",
"value": "Quentin Kaiser from ONEKEY Research Labs"
}
]
}