2024-05-30 20:03:30 +00:00
{
"id" : "CVE-2024-2422" ,
"sourceIdentifier" : "productsecurity@carrier.com" ,
"published" : "2024-05-30T18:15:09.367" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T09:09:43.220" ,
2024-05-30 20:03:30 +00:00
"vulnStatus" : "Awaiting Analysis" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-05-30 20:03:30 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "LenelS2 NetBox access control and event monitoring system was discovered to contain an authenticated RCE in versions prior to and including 5.6.1, which allows an attacker to execute malicious commands."
2024-06-02 02:03:22 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se descubri\u00f3 que el sistema de monitoreo de eventos y control de acceso LenelS2 NetBox contiene un RCE autenticado en versiones anteriores a la 5.6.1 incluida, lo que permite a un atacante ejecutar comandos maliciosos."
2024-05-30 20:03:30 +00:00
}
] ,
2024-07-14 02:06:08 +00:00
"metrics" : {
"cvssMetricV40" : [
{
"source" : "productsecurity@carrier.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "4.0" ,
"vectorString" : "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.3 ,
"baseSeverity" : "CRITICAL" ,
2024-07-14 02:06:08 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"attackRequirements" : "NONE" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
2025-03-02 03:03:52 +00:00
"vulnConfidentialityImpact" : "HIGH" ,
"vulnIntegrityImpact" : "HIGH" ,
"vulnAvailabilityImpact" : "HIGH" ,
"subConfidentialityImpact" : "NONE" ,
"subIntegrityImpact" : "NONE" ,
"subAvailabilityImpact" : "NONE" ,
2024-07-14 02:06:08 +00:00
"exploitMaturity" : "NOT_DEFINED" ,
2025-03-02 03:03:52 +00:00
"confidentialityRequirement" : "NOT_DEFINED" ,
"integrityRequirement" : "NOT_DEFINED" ,
"availabilityRequirement" : "NOT_DEFINED" ,
2024-07-14 02:06:08 +00:00
"modifiedAttackVector" : "NOT_DEFINED" ,
"modifiedAttackComplexity" : "NOT_DEFINED" ,
"modifiedAttackRequirements" : "NOT_DEFINED" ,
"modifiedPrivilegesRequired" : "NOT_DEFINED" ,
"modifiedUserInteraction" : "NOT_DEFINED" ,
2025-03-02 03:03:52 +00:00
"modifiedVulnConfidentialityImpact" : "NOT_DEFINED" ,
"modifiedVulnIntegrityImpact" : "NOT_DEFINED" ,
"modifiedVulnAvailabilityImpact" : "NOT_DEFINED" ,
"modifiedSubConfidentialityImpact" : "NOT_DEFINED" ,
"modifiedSubIntegrityImpact" : "NOT_DEFINED" ,
"modifiedSubAvailabilityImpact" : "NOT_DEFINED" ,
"Safety" : "NOT_DEFINED" ,
"Automatable" : "NOT_DEFINED" ,
"Recovery" : "NOT_DEFINED" ,
2024-07-14 02:06:08 +00:00
"valueDensity" : "NOT_DEFINED" ,
"vulnerabilityResponseEffort" : "NOT_DEFINED" ,
2024-12-08 03:06:42 +00:00
"providerUrgency" : "NOT_DEFINED"
2024-07-14 02:06:08 +00:00
}
}
]
} ,
2024-05-30 20:03:30 +00:00
"weaknesses" : [
{
"source" : "productsecurity@carrier.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-88"
}
]
}
] ,
"references" : [
{
"url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-01" ,
"source" : "productsecurity@carrier.com"
} ,
{
"url" : "https://www.corporate.carrier.com/Images/CARR-PSA-2024-01-NetBox_tcm558-227956.pdf" ,
"source" : "productsecurity@carrier.com"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-01" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.corporate.carrier.com/Images/CARR-PSA-2024-01-NetBox_tcm558-227956.pdf" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2024-05-30 20:03:30 +00:00
}
]
}