CVE-2024-21879

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:enphase:iq_gateway:-:*:*:*:*:*:*:*

History

23 Aug 2024, 17:49

Type Values Removed Values Added
References () https://csirt.divd.nl/CVE-2024-21879 - () https://csirt.divd.nl/CVE-2024-21879 - Third Party Advisory
References () https://csirt.divd.nl/DIVD-2024-00011 - () https://csirt.divd.nl/DIVD-2024-00011 - Third Party Advisory
References () https://enphase.com/cybersecurity/advisories/ensa-2024-4 - () https://enphase.com/cybersecurity/advisories/ensa-2024-4 - Vendor Advisory
Summary
  • (es) La neutralización inadecuada de elementos especiales utilizados en una vulnerabilidad de comando ("Inyección de comando") a través de un parámetro de URL de un punto autenticado en Enphase IQ Gateway (anteriormente conocido como Envoy) permite la inyección de comando del sistema operativo. Este problema afecta a Envoy: de 4.x a 8. .xy &lt;8.2.4225.
First Time Enphase iq Gateway
Enphase iq Gateway Firmware
Enphase
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-78
CPE cpe:2.3:h:enphase:iq_gateway:-:*:*:*:*:*:*:*
cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:*

12 Aug 2024, 13:41

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-12 13:38

Updated : 2024-08-23 17:49


NVD link : CVE-2024-21879

Mitre link : CVE-2024-21879

CVE.ORG link : CVE-2024-21879


JSON object : View

Products Affected

enphase

  • iq_gateway_firmware
  • iq_gateway
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')