forked from CVEProject/cvelistV5
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- 2 new CVEs: CVE-2024-13892, CVE-2024-13893 - 1 updated CVEs: CVE-2023-6717
- Loading branch information
cvelistV5 Github Action
committed
Mar 6, 2025
1 parent
e650004
commit 05986d9
Showing
3 changed files
with
300 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,154 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-13892", | ||
"assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "CERT-PL", | ||
"dateReserved": "2025-02-20T14:05:38.748Z", | ||
"datePublished": "2025-03-06T14:00:41.444Z", | ||
"dateUpdated": "2025-03-06T14:00:41.444Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"affected": [ | ||
{ | ||
"defaultStatus": "unknown", | ||
"product": "CIP-37210AT", | ||
"vendor": "Smartwares", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "3.3.0", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
}, | ||
{ | ||
"defaultStatus": "unknown", | ||
"product": "C724IP", | ||
"vendor": "Smartwares", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "3.3.0", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"type": "finder", | ||
"value": "Michał Majchrowicz (Afine Team)" | ||
}, | ||
{ | ||
"lang": "en", | ||
"type": "finder", | ||
"value": "Marcin Wyczechowski (Afine Team)" | ||
} | ||
], | ||
"datePublic": "2025-03-06T11:00:00.000Z", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to command injection. <br>During the initialization process, a user has to use a mobile app to provide devices with Access Point credentials. This input is not properly sanitized, what allows for command injection.<br>The vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well.<br><br>" | ||
} | ||
], | ||
"value": "Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to command injection. \nDuring the initialization process, a user has to use a mobile app to provide devices with Access Point credentials. This input is not properly sanitized, what allows for command injection.\nThe vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well." | ||
} | ||
], | ||
"impacts": [ | ||
{ | ||
"capecId": "CAPEC-248", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "CAPEC-248 Command Injection" | ||
} | ||
] | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"cvssV4_0": { | ||
"Automatable": "NOT_DEFINED", | ||
"Recovery": "NOT_DEFINED", | ||
"Safety": "NOT_DEFINED", | ||
"attackComplexity": "LOW", | ||
"attackRequirements": "PRESENT", | ||
"attackVector": "ADJACENT", | ||
"baseScore": 7.7, | ||
"baseSeverity": "HIGH", | ||
"privilegesRequired": "NONE", | ||
"providerUrgency": "NOT_DEFINED", | ||
"subAvailabilityImpact": "NONE", | ||
"subConfidentialityImpact": "NONE", | ||
"subIntegrityImpact": "NONE", | ||
"userInteraction": "NONE", | ||
"valueDensity": "NOT_DEFINED", | ||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", | ||
"version": "4.0", | ||
"vulnAvailabilityImpact": "HIGH", | ||
"vulnConfidentialityImpact": "HIGH", | ||
"vulnIntegrityImpact": "HIGH", | ||
"vulnerabilityResponseEffort": "NOT_DEFINED" | ||
}, | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
] | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-77", | ||
"description": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", | ||
"shortName": "CERT-PL", | ||
"dateUpdated": "2025-03-06T14:00:41.444Z" | ||
}, | ||
"references": [ | ||
{ | ||
"tags": [ | ||
"third-party-advisory" | ||
], | ||
"url": "https://cert.pl/en/posts/2025/02/CVE-2024-13892/" | ||
}, | ||
{ | ||
"tags": [ | ||
"product" | ||
], | ||
"url": "https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at" | ||
} | ||
], | ||
"source": { | ||
"discovery": "UNKNOWN" | ||
}, | ||
"title": "Command Injection in Smartwares cameras", | ||
"x_generator": { | ||
"engine": "Vulnogram 0.2.0" | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,143 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-13893", | ||
"assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "CERT-PL", | ||
"dateReserved": "2025-02-20T14:05:40.498Z", | ||
"datePublished": "2025-03-06T14:01:06.389Z", | ||
"dateUpdated": "2025-03-06T14:01:06.389Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"affected": [ | ||
{ | ||
"defaultStatus": "unknown", | ||
"product": "CIP-37210AT", | ||
"vendor": "Smartwares", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "3.3.0", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
}, | ||
{ | ||
"defaultStatus": "unknown", | ||
"product": "C724IP", | ||
"vendor": "Smartwares", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "3.3.0", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"type": "finder", | ||
"value": "Michał Majchrowicz (Afine Team)" | ||
}, | ||
{ | ||
"lang": "en", | ||
"type": "finder", | ||
"value": "Marcin Wyczechowski (Afine Team)" | ||
} | ||
], | ||
"datePublic": "2025-03-06T11:00:00.000Z", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.<br>For the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created. <br>Two products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.<br> Newer firmware versions might be vulnerable as well.<br><br>" | ||
} | ||
], | ||
"value": "Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.\nFor the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created. \nTwo products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.\n Newer firmware versions might be vulnerable as well." | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"cvssV4_0": { | ||
"Automatable": "NOT_DEFINED", | ||
"Recovery": "NOT_DEFINED", | ||
"Safety": "NOT_DEFINED", | ||
"attackComplexity": "HIGH", | ||
"attackRequirements": "PRESENT", | ||
"attackVector": "LOCAL", | ||
"baseScore": 7.5, | ||
"baseSeverity": "HIGH", | ||
"privilegesRequired": "NONE", | ||
"providerUrgency": "NOT_DEFINED", | ||
"subAvailabilityImpact": "NONE", | ||
"subConfidentialityImpact": "NONE", | ||
"subIntegrityImpact": "NONE", | ||
"userInteraction": "NONE", | ||
"valueDensity": "NOT_DEFINED", | ||
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", | ||
"version": "4.0", | ||
"vulnAvailabilityImpact": "HIGH", | ||
"vulnConfidentialityImpact": "HIGH", | ||
"vulnIntegrityImpact": "HIGH", | ||
"vulnerabilityResponseEffort": "NOT_DEFINED" | ||
}, | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
] | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-1392", | ||
"description": "CWE-1392 Use of Default Credentials", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", | ||
"shortName": "CERT-PL", | ||
"dateUpdated": "2025-03-06T14:01:06.389Z" | ||
}, | ||
"references": [ | ||
{ | ||
"tags": [ | ||
"third-party-advisory" | ||
], | ||
"url": "https://cert.pl/en/posts/2025/02/CVE-2024-13892/" | ||
}, | ||
{ | ||
"tags": [ | ||
"product" | ||
], | ||
"url": "https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at" | ||
} | ||
], | ||
"source": { | ||
"discovery": "UNKNOWN" | ||
}, | ||
"title": "Shared credentials in Smartwares cameras", | ||
"x_generator": { | ||
"engine": "Vulnogram 0.2.0" | ||
} | ||
} | ||
} | ||
} |