Skip to content

Commit

Permalink
3 changes (2 new | 1 updated):
Browse files Browse the repository at this point in the history
      - 2 new CVEs:  CVE-2024-13892, CVE-2024-13893
      - 1 updated CVEs: CVE-2023-6717
  • Loading branch information
cvelistV5 Github Action committed Mar 6, 2025
1 parent e650004 commit 05986d9
Show file tree
Hide file tree
Showing 3 changed files with 300 additions and 3 deletions.
6 changes: 3 additions & 3 deletions cves/2023/6xxx/CVE-2023-6717.json
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
"assignerShortName": "redhat",
"dateReserved": "2023-12-12T07:30:43.924Z",
"datePublished": "2024-04-25T16:02:03.267Z",
"dateUpdated": "2025-03-03T16:29:18.952Z"
"dateUpdated": "2025-03-06T13:58:57.474Z"
},
"containers": {
"cna": {
Expand Down Expand Up @@ -327,7 +327,7 @@
"product": "Migration Toolkit for Applications 7",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "mta/mta-ui-rhel9",
"defaultStatus": "affected",
"defaultStatus": "unaffected",
"cpes": [
"cpe:/a:redhat:migration_toolkit_applications:7"
]
Expand Down Expand Up @@ -579,7 +579,7 @@
"providerMetadata": {
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat",
"dateUpdated": "2025-03-03T16:29:18.952Z"
"dateUpdated": "2025-03-06T13:58:57.474Z"
}
},
"adp": [
Expand Down
154 changes: 154 additions & 0 deletions cves/2024/13xxx/CVE-2024-13892.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,154 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-13892",
"assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
"state": "PUBLISHED",
"assignerShortName": "CERT-PL",
"dateReserved": "2025-02-20T14:05:38.748Z",
"datePublished": "2025-03-06T14:00:41.444Z",
"dateUpdated": "2025-03-06T14:00:41.444Z"
},
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "CIP-37210AT",
"vendor": "Smartwares",
"versions": [
{
"lessThanOrEqual": "3.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unknown",
"product": "C724IP",
"vendor": "Smartwares",
"versions": [
{
"lessThanOrEqual": "3.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michał Majchrowicz (Afine Team)"
},
{
"lang": "en",
"type": "finder",
"value": "Marcin Wyczechowski (Afine Team)"
}
],
"datePublic": "2025-03-06T11:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Smartwares cameras&nbsp;CIP-37210AT and&nbsp;C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to command injection. <br>During the initialization process, a user has to use a mobile app to provide devices with Access Point credentials. This input is not properly sanitized, what allows for command injection.<br>The vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well.<br><br>"
}
],
"value": "Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to command injection. \nDuring the initialization process, a user has to use a mobile app to provide devices with Access Point credentials. This input is not properly sanitized, what allows for command injection.\nThe vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well."
}
],
"impacts": [
{
"capecId": "CAPEC-248",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-248 Command Injection"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
"shortName": "CERT-PL",
"dateUpdated": "2025-03-06T14:00:41.444Z"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://cert.pl/en/posts/2025/02/CVE-2024-13892/"
},
{
"tags": [
"product"
],
"url": "https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Command Injection in Smartwares cameras",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
}
}
143 changes: 143 additions & 0 deletions cves/2024/13xxx/CVE-2024-13893.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,143 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-13893",
"assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
"state": "PUBLISHED",
"assignerShortName": "CERT-PL",
"dateReserved": "2025-02-20T14:05:40.498Z",
"datePublished": "2025-03-06T14:01:06.389Z",
"dateUpdated": "2025-03-06T14:01:06.389Z"
},
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "CIP-37210AT",
"vendor": "Smartwares",
"versions": [
{
"lessThanOrEqual": "3.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unknown",
"product": "C724IP",
"vendor": "Smartwares",
"versions": [
{
"lessThanOrEqual": "3.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michał Majchrowicz (Afine Team)"
},
{
"lang": "en",
"type": "finder",
"value": "Marcin Wyczechowski (Afine Team)"
}
],
"datePublic": "2025-03-06T11:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Smartwares cameras&nbsp;CIP-37210AT and&nbsp;C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.<br>For the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created.&nbsp;<br>Two products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.<br> Newer firmware versions might be vulnerable as well.<br><br>"
}
],
"value": "Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.\nFor the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created. \nTwo products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.\n Newer firmware versions might be vulnerable as well."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1392",
"description": "CWE-1392 Use of Default Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
"shortName": "CERT-PL",
"dateUpdated": "2025-03-06T14:01:06.389Z"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://cert.pl/en/posts/2025/02/CVE-2024-13892/"
},
{
"tags": [
"product"
],
"url": "https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Shared credentials in Smartwares cameras",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
}
}

0 comments on commit 05986d9

Please sign in to comment.