Inadequate Encryption Strength vulnerability allow an authenticated attacker to execute arbitrary OS Commands via encrypted package upload.This issue affects Envoy: 4.x and 5.x
Advisories
Source ID Title
EUVD EUVD EUVD-2024-19492 Inadequate Encryption Strength vulnerability allow an authenticated attacker to execute arbitrary OS Commands via encrypted package upload.This issue affects Envoy: 4.x and 5.x
Fixes

Solution

Devices are remotely being updated by the vendor.


Workaround

It is adviced to not expose this device to untrusted network acces. In other words, make sure this decvice is not reachable from the internet, a guest network or a public network.

History

Mon, 12 Aug 2024 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Enphase
Enphase envoy
CPEs cpe:2.3:h:enphase:envoy:-:*:*:*:*:*:*:*
Vendors & Products Enphase
Enphase envoy
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 10 Aug 2024 18:00:00 +0000

Type Values Removed Values Added
Description Inadequate Encryption Strength vulnerability allow an authenticated attacker to execute arbitrary OS Commands via encrypted package upload.This issue affects Envoy: 4.x and 5.x
Title Upload of encrypted packages allows authenticated command execution in Enphase IQ Gateway v4.x and v5.x
Weaknesses CWE-326
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/S:P/AU:Y/R:I/V:C/RE:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: DIVD

Published:

Updated: 2025-03-11T13:38:24.981Z

Reserved: 2024-01-02T18:30:11.175Z

Link: CVE-2024-21881

cve-icon Vulnrichment

Updated: 2024-08-12T16:37:18.414Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-12T13:38:15.500

Modified: 2024-08-12T13:41:36.517

Link: CVE-2024-21881

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.