2025-01-12 03:03:49 +00:00

60 lines
2.3 KiB
JSON

{
"id": "CVE-2024-54007",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-01-07T18:15:20.240",
"lastModified": "2025-01-07T19:15:32.927",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple command injection vulnerabilities exist in the web interface of the 501 Wireless Client Bridge which could lead to authenticated remote command execution. Successful exploitation of these vulnerabilities result in the ability of an attacker to execute arbitrary commands as a privileged user on the underlying operating system. Exploitation requires administrative authentication credentials on the host system."
},
{
"lang": "es",
"value": "Existen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos en la interfaz web de 501 Wireless Client Bridge que podr\u00edan provocar la ejecuci\u00f3n remota de comandos autenticados. La explotaci\u00f3n exitosa de estas vulnerabilidades da como resultado la capacidad de un atacante para ejecutar comandos arbitrarios como un usuario privilegiado en el sistema operativo subyacente. La explotaci\u00f3n requiere credenciales de autenticaci\u00f3n administrativa en el sistema host."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04763en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}