Multiple authenticated operating system (OS) command injection vulnerabilities exist in Firewalla Box Software
versions before 1.979. A physically close
attacker that is authenticated to the Bluetooth Low-Energy (BTLE) interface can use the network configuration service to inject commands in various configuration parameters including networkConfig.Interface.Phy.Eth0.Extra.PingTestIP, networkConfig.Interface.Phy.Eth0.Extra.DNSTestDomain, and networkConfig.Interface.Phy.Eth0.Gateway6. Additionally, because the configuration can be synced to the Firewalla cloud, the attacker may be able to persist access even after hardware resets and firmware re-flashes.
References
Configurations
No configuration.
History
21 Aug 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Aug 2024, 12:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
12 Aug 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-12 19:15
Updated : 2024-08-21 18:15
NVD link : CVE-2024-40893
Mitre link : CVE-2024-40893
CVE.ORG link : CVE-2024-40893
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')