2024-12-08 03:06:42 +00:00

79 lines
2.3 KiB
JSON

{
"id": "CVE-2024-6047",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-06-17T06:15:09.237",
"lastModified": "2024-11-21T09:48:50.243",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "twcert@cert.org.tw",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device."
},
{
"lang": "es",
"value": "Ciertos dispositivos EOL GeoVision no filtran adecuadamente la entrada del usuario para la funcionalidad espec\u00edfica. Los atacantes remotos no autenticados pueden aprovechar esta vulnerabilidad para inyectar y ejecutar comandos arbitrarios del sistema en el dispositivo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7884-c5a8b-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7883-f5635-1.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/en/cp-139-7884-c5a8b-2.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7883-f5635-1.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}