Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-4999", "assignerOrgId": "2d533b80-6e4a-4e20-93e2-171235122846", "state": "PUBLISHED", "assignerShortName": "ONEKEY", "dateReserved": "2024-05-16T12:06:27.762Z", "datePublished": "2024-05-16T12:14:51.671Z", "dateUpdated": "2024-08-01T20:55:10.386Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "UNITY", "vendor": "Ligowave", "versions": [{"lessThanOrEqual": "6.95-2", "status": "affected", "version": "0", "versionType": "semver"}]}, {"defaultStatus": "unaffected", "product": "PRO", "vendor": "Ligowave", "versions": [{"lessThanOrEqual": "6.95-1.rt3883", "status": "affected", "version": "0", "versionType": "semver"}]}, {"defaultStatus": "unaffected", "product": "MIMO", "vendor": "Ligowave", "versions": [{"lessThanOrEqual": "6.95-1.rt2880", "status": "affected", "version": "0", "versionType": "semver"}]}, {"defaultStatus": "unaffected", "product": "APC Propeller", "vendor": "Ligowave", "versions": [{"lessThanOrEqual": "2-5.95-4.rt3352", "status": "affected", "version": "0", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "finder", "value": "Quentin Kaiser from ONEKEY Research Labs"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "A vulnerability in the web-based management interface of multiple Ligowave devices could allow an authenticated remote attacker to execute arbitrary commands with elevated privileges.<p>This issue affects UNITY: through 6.95-2; PRO: through 6.95-1.Rt3883; MIMO: through 6.95-1.Rt2880; APC Propeller: through 2-5.95-4.Rt3352.</p>"}], "value": "A vulnerability in the web-based management interface of multiple Ligowave devices could allow an authenticated remote\u00a0attacker to execute arbitrary commands with elevated privileges.This issue affects UNITY: through 6.95-2; PRO: through 6.95-1.Rt3883; MIMO: through 6.95-1.Rt2880; APC Propeller: through 2-5.95-4.Rt3352."}], "impacts": [{"capecId": "CAPEC-88", "descriptions": [{"lang": "en", "value": "CAPEC-88 OS Command Injection"}]}], "metrics": [{"cvssV4_0": {"Automatable": "YES", "Recovery": "USER", "Safety": "NEGLIGIBLE", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 9.4, "baseSeverity": "CRITICAL", "privilegesRequired": "HIGH", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "MODERATE"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "2d533b80-6e4a-4e20-93e2-171235122846", "shortName": "ONEKEY", "dateUpdated": "2024-05-16T12:17:49.310Z"}, "references": [{"tags": ["third-party-advisory"], "url": "https://onekey.com/blog/security-advisory-remote-code-execution-in-ligowave-devices/"}], "source": {"discovery": "UNKNOWN"}, "title": "Ligowave Unity/Pro/Mimo/APC Arbitrary Command Injection", "workarounds": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "This product being EOL, Ligowave will not patch the vulnerability. If replacement of the EOL device is not possible, ensure access to the administration interface is restricted to administration network zones only, to reduce likelihood of exploitation."}], "value": "This product being EOL, Ligowave will not patch the vulnerability. If replacement of the EOL device is not possible, ensure access to the administration interface is restricted to administration network zones only, to reduce likelihood of exploitation."}], "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2024-4999", "role": "CISA Coordinator", "options": [{"Exploitation": "poc"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2024-05-16T15:17:05.688626Z"}}}], "affected": [{"cpes": ["cpe:2.3:h:ligowave:unity:6.95-2:*:*:*:*:*:*:*"], "vendor": "ligowave", "product": "unity", "versions": [{"status": "affected", "version": "6.95-2"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:h:ligowave:pro:6.95-1.rt3883:*:*:*:*:*:*:*"], "vendor": "ligowave", "product": "pro", "versions": [{"status": "affected", "version": "6.95-1.rt3883"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:h:ligowave:mimo:6.95-1.rt2880:*:*:*:*:*:*:*"], "vendor": "ligowave", "product": "mimo", "versions": [{"status": "affected", "version": "6.95-1.rt2880"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:h:ligowave:apc_propeller:2-5.95-4.rt3352:*:*:*:*:*:*:*"], "vendor": "ligowave", "product": "apc_propeller", "versions": [{"status": "affected", "version": "2-5.95-4.rt3352"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-06-04T17:53:18.448Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-01T20:55:10.386Z"}, "title": "CVE Program Container", "references": [{"tags": ["third-party-advisory", "x_transferred"], "url": "https://onekey.com/blog/security-advisory-remote-code-execution-in-ligowave-devices/"}]}]}}