From 7c5dd9a6ff620678ece3ba1badfa933f05cfdf28 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 8 Dec 2024 11:03:43 +0000 Subject: [PATCH] Auto-Update: 2024-12-08T11:00:19.808697+00:00 --- CVE-2024/CVE-2024-123xx/CVE-2024-12343.json | 145 ++++++++++++++++++++ README.md | 8 +- _state.csv | 3 +- 3 files changed, 151 insertions(+), 5 deletions(-) create mode 100644 CVE-2024/CVE-2024-123xx/CVE-2024-12343.json diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12343.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12343.json new file mode 100644 index 00000000000..9d008182fdd --- /dev/null +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12343.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-12343", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-08T10:15:04.637", + "lastModified": "2024-12-08T10:15:04.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 6.1, + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.5, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Zephkek/TP-WANPunch/blob/main/README.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.287262", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.287262", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.446212", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tp-link.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3b878a70d0c..f42d2a3f0e4 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-08T09:00:19.961458+00:00 +2024-12-08T11:00:19.808697+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-08T07:15:04.950000+00:00 +2024-12-08T10:15:04.637000+00:00 ``` ### Last Data Feed Release @@ -33,14 +33,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -272599 +272600 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -- [CVE-2024-12342](CVE-2024/CVE-2024-123xx/CVE-2024-12342.json) (`2024-12-08T07:15:04.950`) +- [CVE-2024-12343](CVE-2024/CVE-2024-123xx/CVE-2024-12343.json) (`2024-12-08T10:15:04.637`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index ba5aa28f1df..f94ad09cc4b 100644 --- a/_state.csv +++ b/_state.csv @@ -244215,7 +244215,8 @@ CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0 CVE-2024-12326,0,0,f960296d4c7a80b2aa28fc7f84f75a77ad31211d0d7e9b5df25b051a57e66633,2024-12-06T21:15:05.957000 CVE-2024-1233,0,0,9d758d75169c31056a2dd99a6ff761ac0a3c179827b3dc598c6fb0d83614dada,2024-11-21T08:50:07.317000 CVE-2024-1234,0,0,6b4d1ae0b8159c98fb379447cf95a21f71a7514cfa9af5f48616ab89e3a52cca,2024-11-21T08:50:07.567000 -CVE-2024-12342,1,1,c8f9d4658bb439c06796f6393d38c161608854ed130acdc85baa16bde35bc56c,2024-12-08T07:15:04.950000 +CVE-2024-12342,0,0,c8f9d4658bb439c06796f6393d38c161608854ed130acdc85baa16bde35bc56c,2024-12-08T07:15:04.950000 +CVE-2024-12343,1,1,40124b18e2d3de18ab98a4f87f9d42f8013f21e96e390110cdec80fee777538a,2024-12-08T10:15:04.637000 CVE-2024-1235,0,0,fd37d01ad20dcc5d0dd22397b78801055d1e00ef080900e252a8af428afe4d67,2024-11-21T08:50:07.683000 CVE-2024-1236,0,0,98cf8c8d0d2027d41420e47ce0e54a62c55b6c82b55779fb1975380b5e094f29,2024-11-21T08:50:07.797000 CVE-2024-1237,0,0,7608b762d209f55f10a23dbde634d086adad1d6240344714ec7de5c458d836b6,2024-11-21T08:50:07.910000