← Back to CVEs
CVE-2024-21878
CRITICAL9.8
Description
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection. This vulnerability is present in an internal script.This issue affects Envoy: from 4.x up to and including 8.x and is currently unpatched.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published8/12/2024
Last Modified8/23/2024
Sourcenvd
Honeypot Sightings0
Affected Products
enphase:iq_gatewayenphase:iq_gateway_firmware
Weaknesses (CWE)
CWE-77CWE-78
References
https://csirt.divd.nl/CVE-2024-21878(csirt@divd.nl)
https://csirt.divd.nl/DIVD-2024-00011(csirt@divd.nl)
https://enphase.com/cybersecurity/advisories/ensa-2024-3(csirt@divd.nl)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.