A vulnerability has been identified in InterMesh 7177 Hybrid 2.0 Subscriber (All versions < V8.2.12), InterMesh 7707 Fire Subscriber (All versions < V7.2.12 only if the IP interface is enabled (which is not the default configuration)). The web server of affected devices does not sanitize the input parameters in specific GET requests that allow for code execution on operating system level. In combination with other vulnerabilities (CVE-2024-47902, CVE-2024-47903, CVE-2024-47904) this could allow an unauthenticated remote attacker to execute arbitrary code with root privileges.
History

Wed, 30 Oct 2024 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Siemens intermesh 7177 Hybrid 2.0 Subscriber
Siemens intermesh 7707 Fire Subscriber Firmware
CPEs cpe:2.3:h:siemens:intermesh_7177_hybrid_2.0_subscriber:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:intermesh_7707_fire_subscriber:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:intermesh_7177_hybrid_2.0_subscriber:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:intermesh_7707_fire_subscriber_firmware:*:*:*:*:*:*:*:*
Vendors & Products Siemens intermesh 7177 Hybrid 2.0 Subscriber
Siemens intermesh 7707 Fire Subscriber Firmware

Wed, 23 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Siemens
Siemens intermesh 7177 Hybrid2.0 Subscriber
Siemens intermesh 7707 Fire Subscriber
CPEs cpe:2.3:a:siemens:intermesh_7177_hybrid2.0_subscriber:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:intermesh_7707_fire_subscriber:*:*:*:*:*:*:*:*
Vendors & Products Siemens
Siemens intermesh 7177 Hybrid2.0 Subscriber
Siemens intermesh 7707 Fire Subscriber
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 23 Oct 2024 14:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in InterMesh 7177 Hybrid 2.0 Subscriber (All versions < V8.2.12), InterMesh 7707 Fire Subscriber (All versions < V7.2.12 only if the IP interface is enabled (which is not the default configuration)). The web server of affected devices does not sanitize the input parameters in specific GET requests that allow for code execution on operating system level. In combination with other vulnerabilities (CVE-2024-47902, CVE-2024-47903, CVE-2024-47904) this could allow an unauthenticated remote attacker to execute arbitrary code with root privileges.
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published: 2024-10-23T14:21:19.200Z

Updated: 2024-10-23T18:18:54.551Z

Reserved: 2024-10-04T16:15:00.391Z

Link: CVE-2024-47901

cve-icon Vulnrichment

Updated: 2024-10-23T18:18:50.333Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-23T15:15:30.930

Modified: 2024-10-30T15:39:47.430

Link: CVE-2024-47901

cve-icon Redhat

No data.