CVE-2024-38817
Vulnerability from cvelistv5
Published
2024-10-09 19:28
Modified
2024-10-10 07:54
Severity ?
EPSS score ?
Summary
VMware NSX contains a command injection vulnerability.
A malicious actor with access to the NSX Edge CLI terminal may be able to craft malicious payloads to execute arbitrary commands on the operating system as root.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | VMware NSX, VMware Cloud Foundation |
Version: VMware NSX 4.1.x, NSX-T 3.2.x |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:vmware:nsx:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "nsx", "vendor": "vmware", "versions": [ { "lessThan": "4.2.1", "status": "affected", "version": "4.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:vmware:nsx-t:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "nsx-t", "vendor": "vmware", "versions": [ { "lessThan": "3.2.4.1", "status": "affected", "version": "3.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cloud_foundation", "vendor": "vmware", "versions": [ { "lessThan": "Async_Patch_to_4.2.1", "status": "affected", "version": "5.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-38817", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T20:19:58.944760Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T20:28:22.797Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "VMware NSX, VMware Cloud Foundation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware NSX 4.1.x, NSX-T 3.2.x" } ] } ], "datePublic": "2024-10-09T17:27:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware NSX contains a command injection vulnerability.\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA malicious actor with access to the NSX Edge CLI terminal may be able to craft malicious payloads to execute arbitrary commands on the operating system as root.\u003c/span\u003e\n\n\u003c/span\u003e" } ], "value": "VMware NSX contains a command injection vulnerability.\u00a0\n\nA malicious actor with access to the NSX Edge CLI terminal may be able to craft malicious payloads to execute arbitrary commands on the operating system as root." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T07:54:34.429Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25047" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2024-38817", "datePublished": "2024-10-09T19:28:05.514Z", "dateReserved": "2024-06-19T22:32:06.582Z", "dateUpdated": "2024-10-10T07:54:34.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-38817\",\"sourceIdentifier\":\"security@vmware.com\",\"published\":\"2024-10-09T20:15:08.037\",\"lastModified\":\"2024-10-10T12:51:56.987\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"VMware NSX contains a command injection vulnerability.\u00a0\\n\\nA malicious actor with access to the NSX Edge CLI terminal may be able to craft malicious payloads to execute arbitrary commands on the operating system as root.\"},{\"lang\":\"es\",\"value\":\"Mware NSX contiene una vulnerabilidad de inyecci\u00f3n de comandos. Un actor malintencionado con acceso a la terminal CLI de NSX Edge podr\u00eda manipular payloads maliciosos para ejecutar comandos arbitrarios en el sistema operativo como root.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@vmware.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@vmware.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]}],\"references\":[{\"url\":\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25047\",\"source\":\"security@vmware.com\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.