Search criteria

14 vulnerabilities found for VAP11G by Vonets

CVE-2024-42001 (GCVE-0-2024-42001)

Vulnerability from cvelistv5 – Published: 2024-08-08 19:39 – Updated: 2024-08-21 20:04
VLAI?
Title
Vonets WiFi Bridges Forced Browsing
Summary
An improper authentication vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior enables an unauthenticated remote attacker to bypass authentication via a specially crafted direct request when another user has an active session.
CWE
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42001",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:41:30.751151Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-21T20:04:53.127Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An improper authentication vulnerability affecting Vonets\n\n\n\n\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior enables an unauthenticated remote attacker to \nbypass authentication via a specially crafted direct request when \nanother user has an active session."
            }
          ],
          "value": "An improper authentication vulnerability affecting Vonets\n\n\n\n\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior enables an unauthenticated remote attacker to \nbypass authentication via a specially crafted direct request when \nanother user has an active session."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "NETWORK",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-425",
              "description": "CWE-425 Forced Browsing",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:39:49.024Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Forced Browsing",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-42001",
    "datePublished": "2024-08-08T19:39:49.024Z",
    "dateReserved": "2024-07-30T16:15:10.118Z",
    "dateUpdated": "2024-08-21T20:04:53.127Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-39791 (GCVE-0-2024-39791)

Vulnerability from cvelistv5 – Published: 2024-08-08 19:36 – Updated: 2024-08-21 20:05
VLAI?
Title
Vonets WiFi Bridges Stack-based Buffer Overflow
Summary
Stack-based buffer overflow vulnerabilities affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an unauthenticated remote attacker to execute arbitrary code.
CWE
  • CWE-121 - Stack-based Buffer Overflow
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-39791",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:39:45.672202Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-21T20:05:07.240Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Stack-based buffer overflow vulnerabilities affecting Vonets\n\n\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior, enable an unauthenticated remote attacker to \nexecute arbitrary code."
            }
          ],
          "value": "Stack-based buffer overflow vulnerabilities affecting Vonets\n\n\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior, enable an unauthenticated remote attacker to \nexecute arbitrary code."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 10,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 10,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121 Stack-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:36:17.337Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Stack-based Buffer Overflow",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-39791",
    "datePublished": "2024-08-08T19:36:17.337Z",
    "dateReserved": "2024-07-30T16:15:10.126Z",
    "dateUpdated": "2024-08-21T20:05:07.240Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-39815 (GCVE-0-2024-39815)

Vulnerability from cvelistv5 – Published: 2024-08-08 19:33 – Updated: 2024-08-21 20:04
VLAI?
Title
Vonets WiFi Bridges Improper Check or Handling of Exceptional Conditions
Summary
Improper check or handling of exceptional conditions vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an unauthenticated remote attacker to cause a denial of service. A specially-crafted HTTP request to pre-authentication resources can crash the service.
CWE
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-39815",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:41:59.876924Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-21T20:04:38.205Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper check or handling of exceptional conditions vulnerability \naffecting Vonets\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an unauthenticated \nremote attacker to cause a denial of service. A specially-crafted \nHTTP request to pre-authentication resources can crash the service."
            }
          ],
          "value": "Improper check or handling of exceptional conditions vulnerability \naffecting Vonets\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an unauthenticated \nremote attacker to cause a denial of service. A specially-crafted \nHTTP request to pre-authentication resources can crash the service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-703",
              "description": "CWE-703",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:43:20.731Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Improper Check or Handling of Exceptional Conditions",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-39815",
    "datePublished": "2024-08-08T19:33:35.137Z",
    "dateReserved": "2024-07-30T16:15:10.109Z",
    "dateUpdated": "2024-08-21T20:04:38.205Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-37023 (GCVE-0-2024-37023)

Vulnerability from cvelistv5 – Published: 2024-08-08 19:30 – Updated: 2024-08-21 20:04
VLAI?
Title
Vonets WiFi Bridges Command Injection
Summary
Multiple OS command injection vulnerabilities affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an authenticated remote attacker to execute arbitrary OS commands via various endpoint parameters.
CWE
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-37023",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:42:37.219187Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-21T20:04:21.492Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple OS command injection vulnerabilities affecting Vonets \n\n industrial wifi bridge relays and wifi bridge repeaters, software \nversions 3.3.23.6.9 and prior, enable an authenticated remote attacker \nto execute arbitrary OS commands via various endpoint parameters."
            }
          ],
          "value": "Multiple OS command injection vulnerabilities affecting Vonets \n\n industrial wifi bridge relays and wifi bridge repeaters, software \nversions 3.3.23.6.9 and prior, enable an authenticated remote attacker \nto execute arbitrary OS commands via various endpoint parameters."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77 Command Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:42:41.939Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Command Injection",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-37023",
    "datePublished": "2024-08-08T19:30:40.496Z",
    "dateReserved": "2024-07-30T16:15:10.100Z",
    "dateUpdated": "2024-08-21T20:04:21.492Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41936 (GCVE-0-2024-41936)

Vulnerability from cvelistv5 – Published: 2024-08-08 19:27 – Updated: 2024-08-21 20:05
VLAI?
Title
Vonets WiFi Bridges Path Traversal
Summary
A directory traversal vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enables an unauthenticated remote attacker to read arbitrary files and bypass authentication.
CWE
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41936",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T13:40:12.363380Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-21T20:05:27.996Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A directory traversal vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 \nand prior, enables an unauthenticated remote attacker to read arbitrary \nfiles and bypass authentication."
            }
          ],
          "value": "A directory traversal vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 \nand prior, enables an unauthenticated remote attacker to read arbitrary \nfiles and bypass authentication."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Path Traversal",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:42:02.773Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Path Traversal",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-41936",
    "datePublished": "2024-08-08T19:27:19.585Z",
    "dateReserved": "2024-07-30T16:15:10.091Z",
    "dateUpdated": "2024-08-21T20:05:27.996Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-29082 (GCVE-0-2024-29082)

Vulnerability from cvelistv5 – Published: 2024-08-08 19:23 – Updated: 2024-08-21 20:03
VLAI?
Title
Vonets WiFi Bridges Improper Access Control
Summary
Improper access control vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enables an unauthenticated remote attacker to bypass authentication and factory reset the device via unprotected goform endpoints.
CWE
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-29082",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:43:23.222319Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-21T20:03:57.401Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper access control vulnerability affecting Vonets\n\n industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 \nand prior, enables an unauthenticated remote attacker to bypass \nauthentication and factory reset the device via unprotected goform \nendpoints."
            }
          ],
          "value": "Improper access control vulnerability affecting Vonets\n\n industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 \nand prior, enables an unauthenticated remote attacker to bypass \nauthentication and factory reset the device via unprotected goform \nendpoints."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:41:29.764Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Improper Access Control",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-29082",
    "datePublished": "2024-08-08T19:23:23.133Z",
    "dateReserved": "2024-07-30T16:15:10.076Z",
    "dateUpdated": "2024-08-21T20:03:57.401Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41161 (GCVE-0-2024-41161)

Vulnerability from cvelistv5 – Published: 2024-08-08 17:49 – Updated: 2024-08-09 14:37
VLAI?
Title
Vonets WiFi Bridges Use of Hard-coded Credentials
Summary
Use of hard-coded credentials vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enables an unauthenticated remote attacker to bypass authentication using hard-coded administrator credentials. These accounts cannot be disabled.
CWE
  • CWE-798 - Use of Hard-coded Credentials
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41161",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:37:46.342614Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-09T14:37:54.073Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Use of hard-coded credentials vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior, enables an unauthenticated remote attacker to \nbypass authentication using hard-coded administrator credentials. These \naccounts cannot be disabled."
            }
          ],
          "value": "Use of hard-coded credentials vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior, enables an unauthenticated remote attacker to \nbypass authentication using hard-coded administrator credentials. These \naccounts cannot be disabled."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-798",
              "description": "CWE-798 Use of Hard-coded Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:40:53.254Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Use of Hard-coded Credentials",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-41161",
    "datePublished": "2024-08-08T17:49:35.888Z",
    "dateReserved": "2024-07-30T16:15:10.064Z",
    "dateUpdated": "2024-08-09T14:37:54.073Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-42001 (GCVE-0-2024-42001)

Vulnerability from nvd – Published: 2024-08-08 19:39 – Updated: 2024-08-21 20:04
VLAI?
Title
Vonets WiFi Bridges Forced Browsing
Summary
An improper authentication vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior enables an unauthenticated remote attacker to bypass authentication via a specially crafted direct request when another user has an active session.
CWE
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42001",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:41:30.751151Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-21T20:04:53.127Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An improper authentication vulnerability affecting Vonets\n\n\n\n\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior enables an unauthenticated remote attacker to \nbypass authentication via a specially crafted direct request when \nanother user has an active session."
            }
          ],
          "value": "An improper authentication vulnerability affecting Vonets\n\n\n\n\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior enables an unauthenticated remote attacker to \nbypass authentication via a specially crafted direct request when \nanother user has an active session."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "NETWORK",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-425",
              "description": "CWE-425 Forced Browsing",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:39:49.024Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Forced Browsing",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-42001",
    "datePublished": "2024-08-08T19:39:49.024Z",
    "dateReserved": "2024-07-30T16:15:10.118Z",
    "dateUpdated": "2024-08-21T20:04:53.127Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-39791 (GCVE-0-2024-39791)

Vulnerability from nvd – Published: 2024-08-08 19:36 – Updated: 2024-08-21 20:05
VLAI?
Title
Vonets WiFi Bridges Stack-based Buffer Overflow
Summary
Stack-based buffer overflow vulnerabilities affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an unauthenticated remote attacker to execute arbitrary code.
CWE
  • CWE-121 - Stack-based Buffer Overflow
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-39791",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:39:45.672202Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-21T20:05:07.240Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Stack-based buffer overflow vulnerabilities affecting Vonets\n\n\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior, enable an unauthenticated remote attacker to \nexecute arbitrary code."
            }
          ],
          "value": "Stack-based buffer overflow vulnerabilities affecting Vonets\n\n\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior, enable an unauthenticated remote attacker to \nexecute arbitrary code."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 10,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 10,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121 Stack-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:36:17.337Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Stack-based Buffer Overflow",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-39791",
    "datePublished": "2024-08-08T19:36:17.337Z",
    "dateReserved": "2024-07-30T16:15:10.126Z",
    "dateUpdated": "2024-08-21T20:05:07.240Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-39815 (GCVE-0-2024-39815)

Vulnerability from nvd – Published: 2024-08-08 19:33 – Updated: 2024-08-21 20:04
VLAI?
Title
Vonets WiFi Bridges Improper Check or Handling of Exceptional Conditions
Summary
Improper check or handling of exceptional conditions vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an unauthenticated remote attacker to cause a denial of service. A specially-crafted HTTP request to pre-authentication resources can crash the service.
CWE
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-39815",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:41:59.876924Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-21T20:04:38.205Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper check or handling of exceptional conditions vulnerability \naffecting Vonets\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an unauthenticated \nremote attacker to cause a denial of service. A specially-crafted \nHTTP request to pre-authentication resources can crash the service."
            }
          ],
          "value": "Improper check or handling of exceptional conditions vulnerability \naffecting Vonets\n\n \n\n industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an unauthenticated \nremote attacker to cause a denial of service. A specially-crafted \nHTTP request to pre-authentication resources can crash the service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-703",
              "description": "CWE-703",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:43:20.731Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Improper Check or Handling of Exceptional Conditions",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-39815",
    "datePublished": "2024-08-08T19:33:35.137Z",
    "dateReserved": "2024-07-30T16:15:10.109Z",
    "dateUpdated": "2024-08-21T20:04:38.205Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-37023 (GCVE-0-2024-37023)

Vulnerability from nvd – Published: 2024-08-08 19:30 – Updated: 2024-08-21 20:04
VLAI?
Title
Vonets WiFi Bridges Command Injection
Summary
Multiple OS command injection vulnerabilities affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an authenticated remote attacker to execute arbitrary OS commands via various endpoint parameters.
CWE
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-37023",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:42:37.219187Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-21T20:04:21.492Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple OS command injection vulnerabilities affecting Vonets \n\n industrial wifi bridge relays and wifi bridge repeaters, software \nversions 3.3.23.6.9 and prior, enable an authenticated remote attacker \nto execute arbitrary OS commands via various endpoint parameters."
            }
          ],
          "value": "Multiple OS command injection vulnerabilities affecting Vonets \n\n industrial wifi bridge relays and wifi bridge repeaters, software \nversions 3.3.23.6.9 and prior, enable an authenticated remote attacker \nto execute arbitrary OS commands via various endpoint parameters."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77 Command Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:42:41.939Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Command Injection",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-37023",
    "datePublished": "2024-08-08T19:30:40.496Z",
    "dateReserved": "2024-07-30T16:15:10.100Z",
    "dateUpdated": "2024-08-21T20:04:21.492Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41936 (GCVE-0-2024-41936)

Vulnerability from nvd – Published: 2024-08-08 19:27 – Updated: 2024-08-21 20:05
VLAI?
Title
Vonets WiFi Bridges Path Traversal
Summary
A directory traversal vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enables an unauthenticated remote attacker to read arbitrary files and bypass authentication.
CWE
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41936",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T13:40:12.363380Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-21T20:05:27.996Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A directory traversal vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 \nand prior, enables an unauthenticated remote attacker to read arbitrary \nfiles and bypass authentication."
            }
          ],
          "value": "A directory traversal vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 \nand prior, enables an unauthenticated remote attacker to read arbitrary \nfiles and bypass authentication."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Path Traversal",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:42:02.773Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Path Traversal",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-41936",
    "datePublished": "2024-08-08T19:27:19.585Z",
    "dateReserved": "2024-07-30T16:15:10.091Z",
    "dateUpdated": "2024-08-21T20:05:27.996Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-29082 (GCVE-0-2024-29082)

Vulnerability from nvd – Published: 2024-08-08 19:23 – Updated: 2024-08-21 20:03
VLAI?
Title
Vonets WiFi Bridges Improper Access Control
Summary
Improper access control vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enables an unauthenticated remote attacker to bypass authentication and factory reset the device via unprotected goform endpoints.
CWE
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-29082",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:43:23.222319Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-21T20:03:57.401Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper access control vulnerability affecting Vonets\n\n industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 \nand prior, enables an unauthenticated remote attacker to bypass \nauthentication and factory reset the device via unprotected goform \nendpoints."
            }
          ],
          "value": "Improper access control vulnerability affecting Vonets\n\n industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 \nand prior, enables an unauthenticated remote attacker to bypass \nauthentication and factory reset the device via unprotected goform \nendpoints."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:41:29.764Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Improper Access Control",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-29082",
    "datePublished": "2024-08-08T19:23:23.133Z",
    "dateReserved": "2024-07-30T16:15:10.076Z",
    "dateUpdated": "2024-08-21T20:03:57.401Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41161 (GCVE-0-2024-41161)

Vulnerability from nvd – Published: 2024-08-08 17:49 – Updated: 2024-08-09 14:37
VLAI?
Title
Vonets WiFi Bridges Use of Hard-coded Credentials
Summary
Use of hard-coded credentials vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enables an unauthenticated remote attacker to bypass authentication using hard-coded administrator credentials. These accounts cannot be disabled.
CWE
  • CWE-798 - Use of Hard-coded Credentials
Assigner
Impacted products
Vendor Product Version
Vonets VAR1200-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR1200-L Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR600-H Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S-5G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11S Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAR11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11N-300 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11G-500 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VBG1200 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VAP11AC Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
    Vonets VGA-1000 Affected: 0 , ≤ 3.3.23.6.9 (custom)
Create a notification for this product.
Credits
Wodzen reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:vonets:var1200-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:var1200-l_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var1200-l_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:var600-h_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var600-h_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11ac_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11ac_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11g-500s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-500s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vbg1200_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vbg1200_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11s-5g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s-5g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11s_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11s_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:var11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "var11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11g_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vga-1000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vga-1000_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11g-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11g-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vonets:vap11n-300_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vap11n-300_firmware",
            "vendor": "vonets",
            "versions": [
              {
                "lessThanOrEqual": "3.3.23.6.9",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41161",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:37:46.342614Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-09T14:37:54.073Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR1200-L",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR600-H",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S-5G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11S",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAR11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11N-300",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11G-500",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VBG1200",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VAP11AC",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VGA-1000",
          "vendor": "Vonets",
          "versions": [
            {
              "lessThanOrEqual": "3.3.23.6.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Wodzen reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Use of hard-coded credentials vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior, enables an unauthenticated remote attacker to \nbypass authentication using hard-coded administrator credentials. These \naccounts cannot be disabled."
            }
          ],
          "value": "Use of hard-coded credentials vulnerability affecting Vonets industrial wifi bridge relays and wifi bridge repeaters, software versions \n3.3.23.6.9 and prior, enables an unauthenticated remote attacker to \nbypass authentication using hard-coded administrator credentials. These \naccounts cannot be disabled."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-798",
              "description": "CWE-798 Use of Hard-coded Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T19:40:53.254Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-214-08"
        }
      ],
      "source": {
        "advisory": "ICSA-24-214-08",
        "discovery": "EXTERNAL"
      },
      "title": "Vonets WiFi Bridges Use of Hard-coded Credentials",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com\"\u003eVonets support\u003c/a\u003e for additional information.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Vonets has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of the affected products are encouraged to \ncontact  Vonets support https://usdhs-my.sharepoint.com/personal/grayson_gaylor_associates_cisa_dhs_gov1/_layouts/15/support@vonets.com  for additional information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-41161",
    "datePublished": "2024-08-08T17:49:35.888Z",
    "dateReserved": "2024-07-30T16:15:10.064Z",
    "dateUpdated": "2024-08-09T14:37:54.073Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}