2024-01-26 00:55:28 +00:00
{
"id" : "CVE-2024-23628" ,
"sourceIdentifier" : "disclosures@exodusintel.com" ,
"published" : "2024-01-26T00:15:11.273" ,
2024-02-01 21:00:30 +00:00
"lastModified" : "2024-02-01T19:40:28.237" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-01-26 00:55:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A command injection vulnerability exists in the \n'SaveStaticRouteIPv6Params' parameter of the Motorola MR2600. A remote \nattacker can exploit this vulnerability to achieve command execution. \nAuthentication is required, however can be bypassed."
2024-01-26 15:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "Existe una vulnerabilidad de inyecci\u00f3n de comandos en el par\u00e1metro 'SaveStaticRouteIPv6Params' del Motorola MR2600. Un atacante remoto puede aprovechar esta vulnerabilidad para lograr la ejecuci\u00f3n de comandos. Se requiere autenticaci\u00f3n, pero se puede omitir."
2024-01-26 00:55:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-02-01 21:00:30 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
} ,
2024-01-26 00:55:28 +00:00
{
"source" : "disclosures@exodusintel.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" ,
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.0 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 2.3 ,
"impactScore" : 6.0
}
] ,
"cvssMetricV2" : [
{
"source" : "disclosures@exodusintel.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:A/AC:L/Au:S/C:C/I:C/A:C" ,
"accessVector" : "ADJACENT_NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 7.7
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 5.1 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
2024-02-01 21:00:30 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-77"
}
]
} ,
2024-01-26 00:55:28 +00:00
{
"source" : "disclosures@exodusintel.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-77"
}
]
}
] ,
2024-02-01 21:00:30 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:motorola:mr2600_firmware:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB21523A-FF81-44F5-84D4-83D690D1D021"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:motorola:mr2600:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "23CF30D0-9447-49F2-B33B-CA2BF24D6DD2"
}
]
}
]
}
] ,
2024-01-26 00:55:28 +00:00
"references" : [
{
"url" : "https://blog.exodusintel.com/2024/01/25/motorola-mr2600-savestaticrouteipv6params-command-injection-vulnerability/" ,
2024-02-01 21:00:30 +00:00
"source" : "disclosures@exodusintel.com" ,
"tags" : [
"Third Party Advisory"
]
2024-01-26 00:55:28 +00:00
}
]
}