Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19490 | Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225. |
Solution
Devices are remotely being updated by the vendor.
Workaround
It is adviced to not expose this device to untrusted network acces. In other words, make sure this decvice is not reachable from the internet, a guest network or a public network.
Fri, 23 Aug 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Enphase iq Gateway
Enphase iq Gateway Firmware |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:h:enphase:iq_gateway:-:*:*:*:*:*:*:* cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Enphase iq Gateway
Enphase iq Gateway Firmware |
|
| Metrics |
cvssV3_1
|
Tue, 13 Aug 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Enphase
Enphase envoy |
|
| CPEs | cpe:2.3:h:enphase:envoy:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Enphase
Enphase envoy |
|
| Metrics |
ssvc
|
Sat, 10 Aug 2024 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225. | |
| Title | URL parameter manipulations allows an authenticated attacker to execute arbitrary OS commands in Enphase IQ Gateway v4.x to v8.x and < v8.2.4225 | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: DIVD
Published:
Updated: 2025-03-11T13:38:27.809Z
Reserved: 2024-01-02T18:30:11.175Z
Link: CVE-2024-21879
Updated: 2024-08-13T13:32:32.079Z
Status : Analyzed
Published: 2024-08-12T13:38:15.237
Modified: 2024-08-23T17:49:25.830
Link: CVE-2024-21879
No data.
OpenCVE Enrichment
No data.
EUVD