diff --git a/cves/2023/6xxx/CVE-2023-6717.json b/cves/2023/6xxx/CVE-2023-6717.json
index 54910399fad..725182e3947 100644
--- a/cves/2023/6xxx/CVE-2023-6717.json
+++ b/cves/2023/6xxx/CVE-2023-6717.json
@@ -8,7 +8,7 @@
"assignerShortName": "redhat",
"dateReserved": "2023-12-12T07:30:43.924Z",
"datePublished": "2024-04-25T16:02:03.267Z",
- "dateUpdated": "2025-03-03T16:29:18.952Z"
+ "dateUpdated": "2025-03-06T13:58:57.474Z"
},
"containers": {
"cna": {
@@ -327,7 +327,7 @@
"product": "Migration Toolkit for Applications 7",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "mta/mta-ui-rhel9",
- "defaultStatus": "affected",
+ "defaultStatus": "unaffected",
"cpes": [
"cpe:/a:redhat:migration_toolkit_applications:7"
]
@@ -579,7 +579,7 @@
"providerMetadata": {
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat",
- "dateUpdated": "2025-03-03T16:29:18.952Z"
+ "dateUpdated": "2025-03-06T13:58:57.474Z"
}
},
"adp": [
diff --git a/cves/2024/13xxx/CVE-2024-13892.json b/cves/2024/13xxx/CVE-2024-13892.json
new file mode 100644
index 00000000000..bb5b453e86a
--- /dev/null
+++ b/cves/2024/13xxx/CVE-2024-13892.json
@@ -0,0 +1,154 @@
+{
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.1",
+ "cveMetadata": {
+ "cveId": "CVE-2024-13892",
+ "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
+ "state": "PUBLISHED",
+ "assignerShortName": "CERT-PL",
+ "dateReserved": "2025-02-20T14:05:38.748Z",
+ "datePublished": "2025-03-06T14:00:41.444Z",
+ "dateUpdated": "2025-03-06T14:00:41.444Z"
+ },
+ "containers": {
+ "cna": {
+ "affected": [
+ {
+ "defaultStatus": "unknown",
+ "product": "CIP-37210AT",
+ "vendor": "Smartwares",
+ "versions": [
+ {
+ "lessThanOrEqual": "3.3.0",
+ "status": "affected",
+ "version": "0",
+ "versionType": "semver"
+ }
+ ]
+ },
+ {
+ "defaultStatus": "unknown",
+ "product": "C724IP",
+ "vendor": "Smartwares",
+ "versions": [
+ {
+ "lessThanOrEqual": "3.3.0",
+ "status": "affected",
+ "version": "0",
+ "versionType": "semver"
+ }
+ ]
+ }
+ ],
+ "credits": [
+ {
+ "lang": "en",
+ "type": "finder",
+ "value": "Michał Majchrowicz (Afine Team)"
+ },
+ {
+ "lang": "en",
+ "type": "finder",
+ "value": "Marcin Wyczechowski (Afine Team)"
+ }
+ ],
+ "datePublic": "2025-03-06T11:00:00.000Z",
+ "descriptions": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to command injection.
During the initialization process, a user has to use a mobile app to provide devices with Access Point credentials. This input is not properly sanitized, what allows for command injection.
The vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well.
"
+ }
+ ],
+ "value": "Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, are vulnerable to command injection. \nDuring the initialization process, a user has to use a mobile app to provide devices with Access Point credentials. This input is not properly sanitized, what allows for command injection.\nThe vendor has not replied to reports, so the patching status remains unknown. Newer firmware versions might be vulnerable as well."
+ }
+ ],
+ "impacts": [
+ {
+ "capecId": "CAPEC-248",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CAPEC-248 Command Injection"
+ }
+ ]
+ }
+ ],
+ "metrics": [
+ {
+ "cvssV4_0": {
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "attackComplexity": "LOW",
+ "attackRequirements": "PRESENT",
+ "attackVector": "ADJACENT",
+ "baseScore": 7.7,
+ "baseSeverity": "HIGH",
+ "privilegesRequired": "NONE",
+ "providerUrgency": "NOT_DEFINED",
+ "subAvailabilityImpact": "NONE",
+ "subConfidentialityImpact": "NONE",
+ "subIntegrityImpact": "NONE",
+ "userInteraction": "NONE",
+ "valueDensity": "NOT_DEFINED",
+ "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
+ "version": "4.0",
+ "vulnAvailabilityImpact": "HIGH",
+ "vulnConfidentialityImpact": "HIGH",
+ "vulnIntegrityImpact": "HIGH",
+ "vulnerabilityResponseEffort": "NOT_DEFINED"
+ },
+ "format": "CVSS",
+ "scenarios": [
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ]
+ }
+ ],
+ "problemTypes": [
+ {
+ "descriptions": [
+ {
+ "cweId": "CWE-77",
+ "description": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')",
+ "lang": "en",
+ "type": "CWE"
+ }
+ ]
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
+ "shortName": "CERT-PL",
+ "dateUpdated": "2025-03-06T14:00:41.444Z"
+ },
+ "references": [
+ {
+ "tags": [
+ "third-party-advisory"
+ ],
+ "url": "https://cert.pl/en/posts/2025/02/CVE-2024-13892/"
+ },
+ {
+ "tags": [
+ "product"
+ ],
+ "url": "https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at"
+ }
+ ],
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "title": "Command Injection in Smartwares cameras",
+ "x_generator": {
+ "engine": "Vulnogram 0.2.0"
+ }
+ }
+ }
+}
\ No newline at end of file
diff --git a/cves/2024/13xxx/CVE-2024-13893.json b/cves/2024/13xxx/CVE-2024-13893.json
new file mode 100644
index 00000000000..ee71592acb7
--- /dev/null
+++ b/cves/2024/13xxx/CVE-2024-13893.json
@@ -0,0 +1,143 @@
+{
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.1",
+ "cveMetadata": {
+ "cveId": "CVE-2024-13893",
+ "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
+ "state": "PUBLISHED",
+ "assignerShortName": "CERT-PL",
+ "dateReserved": "2025-02-20T14:05:40.498Z",
+ "datePublished": "2025-03-06T14:01:06.389Z",
+ "dateUpdated": "2025-03-06T14:01:06.389Z"
+ },
+ "containers": {
+ "cna": {
+ "affected": [
+ {
+ "defaultStatus": "unknown",
+ "product": "CIP-37210AT",
+ "vendor": "Smartwares",
+ "versions": [
+ {
+ "lessThanOrEqual": "3.3.0",
+ "status": "affected",
+ "version": "0",
+ "versionType": "semver"
+ }
+ ]
+ },
+ {
+ "defaultStatus": "unknown",
+ "product": "C724IP",
+ "vendor": "Smartwares",
+ "versions": [
+ {
+ "lessThanOrEqual": "3.3.0",
+ "status": "affected",
+ "version": "0",
+ "versionType": "semver"
+ }
+ ]
+ }
+ ],
+ "credits": [
+ {
+ "lang": "en",
+ "type": "finder",
+ "value": "Michał Majchrowicz (Afine Team)"
+ },
+ {
+ "lang": "en",
+ "type": "finder",
+ "value": "Marcin Wyczechowski (Afine Team)"
+ }
+ ],
+ "datePublic": "2025-03-06T11:00:00.000Z",
+ "descriptions": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.
For the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created.
Two products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.
Newer firmware versions might be vulnerable as well.
"
+ }
+ ],
+ "value": "Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.\nFor the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created. \nTwo products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.\n Newer firmware versions might be vulnerable as well."
+ }
+ ],
+ "metrics": [
+ {
+ "cvssV4_0": {
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "attackComplexity": "HIGH",
+ "attackRequirements": "PRESENT",
+ "attackVector": "LOCAL",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH",
+ "privilegesRequired": "NONE",
+ "providerUrgency": "NOT_DEFINED",
+ "subAvailabilityImpact": "NONE",
+ "subConfidentialityImpact": "NONE",
+ "subIntegrityImpact": "NONE",
+ "userInteraction": "NONE",
+ "valueDensity": "NOT_DEFINED",
+ "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
+ "version": "4.0",
+ "vulnAvailabilityImpact": "HIGH",
+ "vulnConfidentialityImpact": "HIGH",
+ "vulnIntegrityImpact": "HIGH",
+ "vulnerabilityResponseEffort": "NOT_DEFINED"
+ },
+ "format": "CVSS",
+ "scenarios": [
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ]
+ }
+ ],
+ "problemTypes": [
+ {
+ "descriptions": [
+ {
+ "cweId": "CWE-1392",
+ "description": "CWE-1392 Use of Default Credentials",
+ "lang": "en",
+ "type": "CWE"
+ }
+ ]
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
+ "shortName": "CERT-PL",
+ "dateUpdated": "2025-03-06T14:01:06.389Z"
+ },
+ "references": [
+ {
+ "tags": [
+ "third-party-advisory"
+ ],
+ "url": "https://cert.pl/en/posts/2025/02/CVE-2024-13892/"
+ },
+ {
+ "tags": [
+ "product"
+ ],
+ "url": "https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at"
+ }
+ ],
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "title": "Shared credentials in Smartwares cameras",
+ "x_generator": {
+ "engine": "Vulnogram 0.2.0"
+ }
+ }
+ }
+}
\ No newline at end of file