mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
94 lines
5.2 KiB
JSON
94 lines
5.2 KiB
JSON
{
|
|
"id": "CVE-2024-43658",
|
|
"sourceIdentifier": "csirt@divd.nl",
|
|
"published": "2025-01-09T08:15:28.867",
|
|
"lastModified": "2025-01-09T08:15:28.867",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Patch traversal, External Control of File Name or Path vulnerability in Iocharger Home allows deletion of arbitrary files\nThis issue affects Iocharger firmware for AC model before firmware version 25010801.\n\nLikelihood: High, but requires authentication\n\nImpact: Critical \u2013 The vulnerability can be used to delete any file on the charging station, severely impacting the integrity of the charging station. Furthermore, the vulnerability could be used to delete binaries required for the functioning of the charging station, severely impacting the availability of the charging station.\n\nCVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads compromised of the integrity and availability of the device (VVC:N/VI:H/VA:H), with no effect on subsequent systems (SC:N/SI:N/SA:N). We do not forsee a safety impact (S:N). This attack can be automated (AU:Y)."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Patch traversal, vulnerabilidad de control externo de nombre de archivo o ruta en Iocharger Home permite la eliminaci\u00f3n de archivos arbitrarios Este problema afecta al firmware de Iocharger para el modelo AC anterior a la versi\u00f3n de firmware 25010801. Probabilidad: Alta, pero requiere autenticaci\u00f3n Impacto: Cr\u00edtico: la vulnerabilidad se puede utilizar para eliminar cualquier archivo en la estaci\u00f3n de carga, lo que afecta gravemente la integridad de la estaci\u00f3n de carga. Adem\u00e1s, la vulnerabilidad se podr\u00eda utilizar para eliminar binarios necesarios para el funcionamiento de la estaci\u00f3n de carga, lo que afecta gravemente la disponibilidad de la estaci\u00f3n de carga. Aclaraci\u00f3n de CVSS: cualquier interfaz de red que sirva a la interfaz de usuario web es vulnerable (AV:N) y no hay medidas de seguridad adicionales para eludir (AC:L), ni el ataque requiere condiciones previas existentes (AT:N). El ataque est\u00e1 autenticado, pero el nivel de autenticaci\u00f3n no importa (PR:L), ni se requiere ninguna interacci\u00f3n del usuario (UI:N). El ataque compromete la integridad y disponibilidad del dispositivo (VVC:N/VI:H/VA:H), sin efectos en los sistemas posteriores (SC:N/SI:N/SA:N). No se prev\u00e9n efectos de seguridad (S:N). Este ataque puede automatizarse (AU:Y)."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV40": [
|
|
{
|
|
"source": "csirt@divd.nl",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "4.0",
|
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X",
|
|
"baseScore": 7.2,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"attackRequirements": "NONE",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"vulnConfidentialityImpact": "NONE",
|
|
"vulnIntegrityImpact": "HIGH",
|
|
"vulnAvailabilityImpact": "HIGH",
|
|
"subConfidentialityImpact": "NONE",
|
|
"subIntegrityImpact": "NONE",
|
|
"subAvailabilityImpact": "NONE",
|
|
"exploitMaturity": "NOT_DEFINED",
|
|
"confidentialityRequirement": "NOT_DEFINED",
|
|
"integrityRequirement": "NOT_DEFINED",
|
|
"availabilityRequirement": "NOT_DEFINED",
|
|
"modifiedAttackVector": "NOT_DEFINED",
|
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
|
"modifiedUserInteraction": "NOT_DEFINED",
|
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
|
"Safety": "NEGLIGIBLE",
|
|
"Automatable": "YES",
|
|
"Recovery": "NOT_DEFINED",
|
|
"valueDensity": "NOT_DEFINED",
|
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
|
"providerUrgency": "NOT_DEFINED"
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "csirt@divd.nl",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-27"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-73"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://csirt.divd.nl/CVE-2024-43658/",
|
|
"source": "csirt@divd.nl"
|
|
},
|
|
{
|
|
"url": "https://csirt.divd.nl/DIVD-2024-00035/",
|
|
"source": "csirt@divd.nl"
|
|
},
|
|
{
|
|
"url": "https://iocharger.com",
|
|
"source": "csirt@divd.nl"
|
|
}
|
|
]
|
|
} |