Vulnerabilites related to Microchip - TimeProvider 4100
CVE-2024-7801 (GCVE-0-2024-7801)
Vulnerability from cvelistv5
Published
2024-10-04 19:38
Modified
2024-10-04 22:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Microchip TimeProvider 4100 (Data plot modules) allows SQL Injection.This issue affects TimeProvider 4100: from 1.0 before 2.4.7.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microchip | TimeProvider 4100 |
Version: 1.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-7801", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T21:21:42.790581Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T22:16:19.492Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Data plot" ], "product": "TimeProvider 4100", "vendor": "Microchip", "versions": [ { "lessThan": "2.4.7", "status": "affected", "version": "1.0", "versionType": "firmware" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Armando Huesca Prida" }, { "lang": "en", "type": "finder", "value": "Marco Negro" }, { "lang": "en", "type": "finder", "value": "Antonio Carriero" }, { "lang": "en", "type": "finder", "value": "Vito Pistillo" }, { "lang": "en", "type": "finder", "value": "Davide Renna" }, { "lang": "en", "type": "finder", "value": "Manuel Leone" }, { "lang": "en", "type": "finder", "value": "Massimiliano Brolli" }, { "lang": "en", "type": "reporter", "value": "TIM Security Red Team Research" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in Microchip TimeProvider 4100 (Data plot modules) allows SQL Injection.\u003cp\u003eThis issue affects TimeProvider 4100: from 1.0 before 2.4.7.\u003c/p\u003e" } ], "value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in Microchip TimeProvider 4100 (Data plot modules) allows SQL Injection.This issue affects TimeProvider 4100: from 1.0 before 2.4.7." } ], "impacts": [ { "capecId": "CAPEC-66", "descriptions": [ { "lang": "en", "value": "CAPEC-66 SQL Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.3, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "AMBER", "subAvailabilityImpact": "LOW", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "NONE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/R:U/V:C/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-04T19:44:43.588Z", "orgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "shortName": "Microchip" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-unathenticated-sql-injection" }, { "tags": [ "third-party-advisory" ], "url": "https://www.gruppotim.it/it/footer/red-team.html" } ], "source": { "advisory": "PSIRT-83", "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-27T11:03:00.000Z", "value": "Reported" } ], "title": "SQL injection in get_chart_data in TimeProvider 4100", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e\n\u003cdiv\u003e\u003cp\u003eIt is important to note that the web interface is only available on a\n physically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitations.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e" } ], "value": "It is important to note that the web interface is only available on a\n physically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitations." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "assignerShortName": "Microchip", "cveId": "CVE-2024-7801", "datePublished": "2024-10-04T19:38:08.280Z", "dateReserved": "2024-08-14T15:33:40.608Z", "dateUpdated": "2024-10-04T22:16:19.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-43686 (GCVE-0-2024-43686)
Vulnerability from cvelistv5
Published
2024-10-04 19:47
Modified
2024-10-07 20:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Microchip TimeProvider 4100 (data plot modules) allows Reflected XSS.This issue affects TimeProvider 4100: from 1.0 before 2.4.7.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microchip | TimeProvider 4100 |
Version: 1.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-43686", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T21:21:44.757309Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T22:15:53.397Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "data plot" ], "product": "TimeProvider 4100", "vendor": "Microchip", "versions": [ { "lessThan": "2.4.7", "status": "affected", "version": "1.0", "versionType": "firmware" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Armando Huesca Prida" }, { "lang": "en", "type": "finder", "value": "Marco Negro" }, { "lang": "en", "type": "finder", "value": "Antonio Carriero" }, { "lang": "en", "type": "finder", "value": "Vito Pistillo" }, { "lang": "en", "type": "finder", "value": "Davide Renna" }, { "lang": "en", "type": "finder", "value": "Manuel Leone" }, { "lang": "en", "type": "finder", "value": "Massimiliano Brolli" }, { "lang": "en", "type": "reporter", "value": "TIM Security Red Team Research" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in Microchip TimeProvider 4100 (data plot modules) allows Reflected XSS.\u003cp\u003eThis issue affects TimeProvider 4100: from 1.0 before 2.4.7.\u003c/p\u003e" } ], "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in Microchip TimeProvider 4100 (data plot modules) allows Reflected XSS.This issue affects TimeProvider 4100: from 1.0 before 2.4.7." } ], "impacts": [ { "capecId": "CAPEC-591", "descriptions": [ { "lang": "en", "value": "CAPEC-591 Reflected XSS" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "YES", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "attackVector": "ADJACENT", "baseScore": 5.4, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "GREEN", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/U:Green", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-07T20:42:38.819Z", "orgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "shortName": "Microchip" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-reflected-xss-vulnerability" }, { "tags": [ "third-party-advisory" ], "url": "https://www.gruppotim.it/it/footer/red-team.html" } ], "source": { "advisory": "PSIRT-85", "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-27T11:03:00.000Z", "value": "Reported" } ], "title": "Reflected XSS in TimeProvider 4100 chart component", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "It\n is important to note that the web interface is only available on a \nphysically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitations.\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n \n\n\u003c/div\u003e" } ], "value": "It\n is important to note that the web interface is only available on a \nphysically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitations." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "assignerShortName": "Microchip", "cveId": "CVE-2024-43686", "datePublished": "2024-10-04T19:47:06.117Z", "dateReserved": "2024-08-14T15:39:44.265Z", "dateUpdated": "2024-10-07T20:42:38.819Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-9054 (GCVE-0-2024-9054)
Vulnerability from cvelistv5
Published
2024-10-04 19:42
Modified
2025-08-29 20:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'), Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Microchip TimeProvider 4100 (Configuration modules) allows Command Injection.This issue affects TimeProvider 4100: from 1.0 before 2.4.7.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microchip | TimeProvider 4100 |
Version: 1.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:microchip:timeprovider_4100_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "timeprovider_4100_firmware", "vendor": "microchip", "versions": [ { "lessThan": "2.4.7", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-9054", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T21:24:59.715765Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T22:16:03.570Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Configuration" ], "product": "TimeProvider 4100", "vendor": "Microchip", "versions": [ { "lessThan": "2.4.7", "status": "affected", "version": "1.0", "versionType": "firmware" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Armando Huesca Prida" }, { "lang": "en", "type": "finder", "value": "Marco Negro" }, { "lang": "en", "type": "finder", "value": "Antonio Carriero" }, { "lang": "en", "type": "finder", "value": "Vito Pistillo" }, { "lang": "en", "type": "finder", "value": "Davide Renna" }, { "lang": "en", "type": "finder", "value": "Manuel Leone" }, { "lang": "en", "type": "finder", "value": "Massimiliano Brolli" }, { "lang": "en", "type": "reporter", "value": "TIM Security Red Team Research" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027), Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Microchip TimeProvider 4100 (Configuration modules) allows Command Injection.\u003cp\u003eThis issue affects TimeProvider 4100: from 1.0 before 2.4.7.\u003c/p\u003e" } ], "value": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027), Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Microchip TimeProvider 4100 (Configuration modules) allows Command Injection.This issue affects TimeProvider 4100: from 1.0 before 2.4.7." } ], "impacts": [ { "capecId": "CAPEC-248", "descriptions": [ { "lang": "en", "value": "CAPEC-248 Command Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "YES", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.5, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:C/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-29T20:24:45.480Z", "orgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "shortName": "Microchip" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-rce-through-configuration-file" }, { "tags": [ "third-party-advisory" ], "url": "https://www.gruppotim.it/it/footer/red-team.html" } ], "source": { "advisory": "PSIRT-82", "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-27T11:03:00.000Z", "value": "Reported" } ], "title": "Remote code Execution inTimeProvider\u00ae 4100", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e\u003cdiv\u003eIt is important to note that the web interface is only available on a physically separate management port, and these vulnerabilities have no impact on the timing service ports. For added security, users have the option to disable the web interface, further protecting the device from potential web-based exploits.\u003c/div\u003e\u003c/div\u003e\n\n\u003cbr\u003e" } ], "value": "It is important to note that the web interface is only available on a physically separate management port, and these vulnerabilities have no impact on the timing service ports. For added security, users have the option to disable the web interface, further protecting the device from potential web-based exploits." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "assignerShortName": "Microchip", "cveId": "CVE-2024-9054", "datePublished": "2024-10-04T19:42:44.129Z", "dateReserved": "2024-09-20T18:55:57.827Z", "dateUpdated": "2025-08-29T20:24:45.480Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-43684 (GCVE-0-2024-43684)
Vulnerability from cvelistv5
Published
2024-10-04 19:51
Modified
2025-08-29 20:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Cross-Site Request Forgery (CSRF) vulnerability in Microchip TimeProvider 4100 allows Cross Site Request Forgery, Cross-Site Scripting (XSS).This issue affects TimeProvider 4100: from 1.0.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microchip | TimeProvider 4100 |
Version: 1.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:microchip:timeprovider_4100_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "timeprovider_4100_firmware", "vendor": "microchip", "versions": [ { "lessThan": "2.4.7", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-43684", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T21:24:57.843121Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T22:15:36.419Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "TimeProvider 4100", "vendor": "Microchip", "versions": [ { "lessThanOrEqual": "2.4.7", "status": "affected", "version": "1.0", "versionType": "firmware" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Armando Huesca Prida" }, { "lang": "en", "type": "finder", "value": "Marco Negro" }, { "lang": "en", "type": "finder", "value": "Antonio Carriero" }, { "lang": "en", "type": "finder", "value": "Vito Pistillo" }, { "lang": "en", "type": "finder", "value": "Davide Renna" }, { "lang": "en", "type": "finder", "value": "Manuel Leone" }, { "lang": "en", "type": "finder", "value": "Massimiliano Brolli" }, { "lang": "en", "type": "reporter", "value": "TIM Security Red Team Research" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Microchip TimeProvider 4100 allows Cross Site Request Forgery, Cross-Site Scripting (XSS).\u003cp\u003eThis issue affects TimeProvider 4100: from 1.0.\u003cbr\u003e\u003c/p\u003e" } ], "value": "Cross-Site Request Forgery (CSRF) vulnerability in Microchip TimeProvider 4100 allows Cross Site Request Forgery, Cross-Site Scripting (XSS).This issue affects TimeProvider 4100: from 1.0." } ], "impacts": [ { "capecId": "CAPEC-62", "descriptions": [ { "lang": "en", "value": "CAPEC-62 Cross Site Request Forgery" } ] }, { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H/R:U/V:C/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-29T20:11:56.019Z", "orgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "shortName": "Microchip" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.gruppotim.it/it/footer/red-team.html" }, { "tags": [ "vendor-advisory" ], "url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-cross-site-request-forgery" } ], "source": { "advisory": "PSIRT-87", "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-27T11:03:00.000Z", "value": "Reported" } ], "title": "Cross-Site Request Forgery vulnerability in TimeProvider 4100", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "It is important to note that the web interface is only available on a \nphysically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitations.\u003cbr\u003e" } ], "value": "It is important to note that the web interface is only available on a \nphysically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitations." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "assignerShortName": "Microchip", "cveId": "CVE-2024-43684", "datePublished": "2024-10-04T19:51:51.926Z", "dateReserved": "2024-08-14T15:39:44.265Z", "dateUpdated": "2025-08-29T20:11:56.019Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-43683 (GCVE-0-2024-43683)
Vulnerability from cvelistv5
Published
2024-10-04 19:56
Modified
2024-11-01 15:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Summary
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Microchip TimeProvider 4100 allows XSS Through HTTP Headers.This issue affects TimeProvider 4100: from 1.0.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microchip | TimeProvider 4100 |
Version: 1.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:microchip:timeprovider_4100_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "timeprovider_4100_firmware", "vendor": "microchip", "versions": [ { "lessThan": "2.4.7", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-43683", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T21:24:56.897223Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T22:15:29.701Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "TimeProvider 4100", "vendor": "Microchip", "versions": [ { "lessThan": "2.4.7", "status": "affected", "version": "1.0", "versionType": "firmware" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Armando Huesca Prida" }, { "lang": "en", "type": "finder", "value": "Marco Negro" }, { "lang": "en", "type": "finder", "value": "Antonio Carriero" }, { "lang": "en", "type": "finder", "value": "Vito Pistillo" }, { "lang": "en", "type": "finder", "value": "Davide Renna" }, { "lang": "en", "type": "finder", "value": "Manuel Leone" }, { "lang": "en", "type": "finder", "value": "Massimiliano Brolli" }, { "lang": "en", "type": "reporter", "value": "TIM Security Red Team Research" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027) vulnerability in Microchip TimeProvider 4100 allows XSS Through HTTP Headers.\u003cp\u003eThis issue affects TimeProvider 4100: from 1.0.\u003c/p\u003e" } ], "value": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027) vulnerability in Microchip TimeProvider 4100 allows XSS Through HTTP Headers.This issue affects TimeProvider 4100: from 1.0." } ], "impacts": [ { "capecId": "CAPEC-86", "descriptions": [ { "lang": "en", "value": "CAPEC-86 XSS Through HTTP Headers" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H/R:U/V:C/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-01T15:59:19.229Z", "orgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "shortName": "Microchip" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-improper-verification-of-host-header" }, { "tags": [ "third-party-advisory" ], "url": "https://www.gruppotim.it/it/footer/red-team.html" } ], "source": { "advisory": "PSIRT-88", "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-27T11:03:00.000Z", "value": "Reported" } ], "title": "Improper verification of the Host header in TimeProvider 4100", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "It is important to note that the web interface is only available on a \nphysically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitations.\u003cbr\u003e" } ], "value": "It is important to note that the web interface is only available on a \nphysically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitations." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "assignerShortName": "Microchip", "cveId": "CVE-2024-43683", "datePublished": "2024-10-04T19:56:15.872Z", "dateReserved": "2024-08-14T15:39:44.265Z", "dateUpdated": "2024-11-01T15:59:19.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-43685 (GCVE-0-2024-43685)
Vulnerability from cvelistv5
Published
2024-10-04 19:48
Modified
2025-08-29 20:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-613 - Insufficient Session Expiration
Summary
Improper Authentication vulnerability in Microchip TimeProvider 4100 (login modules) allows Session Hijacking.This issue affects TimeProvider 4100: from 1.0 before 2.4.7.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microchip | TimeProvider 4100 |
Version: 1.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:microchip:timeprovider_4100_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "timeprovider_4100_firmware", "vendor": "microchip", "versions": [ { "lessThan": "2.4.7", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-43685", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T21:24:58.808883Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T22:15:46.343Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "login" ], "product": "TimeProvider 4100", "vendor": "Microchip", "versions": [ { "lessThan": "2.4.7", "status": "affected", "version": "1.0", "versionType": "firmware" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Armando Huesca Prida" }, { "lang": "en", "type": "finder", "value": "Marco Negro" }, { "lang": "en", "type": "finder", "value": "Antonio Carriero" }, { "lang": "en", "type": "finder", "value": "Vito Pistillo" }, { "lang": "en", "type": "finder", "value": "Davide Renna" }, { "lang": "en", "type": "finder", "value": "Manuel Leone" }, { "lang": "en", "type": "finder", "value": "Massimiliano Brolli" }, { "lang": "en", "type": "reporter", "value": "TIM Security Red Team Research" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Authentication vulnerability in Microchip TimeProvider 4100 (login modules) allows Session Hijacking.\u003cp\u003eThis issue affects TimeProvider 4100: from 1.0 before 2.4.7.\u003c/p\u003e" } ], "value": "Improper Authentication vulnerability in Microchip TimeProvider 4100 (login modules) allows Session Hijacking.This issue affects TimeProvider 4100: from 1.0 before 2.4.7." } ], "impacts": [ { "capecId": "CAPEC-593", "descriptions": [ { "lang": "en", "value": "CAPEC-593 Session Hijacking" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H/R:U/V:C/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613 Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-29T20:21:47.659Z", "orgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "shortName": "Microchip" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-session-token-fixation" }, { "tags": [ "third-party-advisory" ], "url": "https://www.gruppotim.it/it/footer/red-team.html" } ], "source": { "advisory": "PSIRT-86", "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-27T11:03:00.000Z", "value": "Reported" } ], "title": "Session token fixation in TimeProvider 4100", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "It is important to note that the web interface is only available on a \nphysically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitations.\n\n\u003cbr\u003e" } ], "value": "It is important to note that the web interface is only available on a \nphysically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitations." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "assignerShortName": "Microchip", "cveId": "CVE-2024-43685", "datePublished": "2024-10-04T19:48:53.595Z", "dateReserved": "2024-08-14T15:39:44.265Z", "dateUpdated": "2025-08-29T20:21:47.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-43687 (GCVE-0-2024-43687)
Vulnerability from cvelistv5
Published
2024-10-04 19:41
Modified
2025-05-23 15:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Microchip TimeProvider 4100 (banner config modules) allows Cross-Site Scripting (XSS).This issue affects TimeProvider 4100: from 1.0 before 2.4.7.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microchip | TimeProvider 4100 |
Version: 1.0 Version: 2.4.16 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-43687", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T21:21:43.789883Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T22:16:09.913Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "banner config" ], "product": "TimeProvider 4100", "vendor": "Microchip", "versions": [ { "lessThan": "2.4.7", "status": "affected", "version": "1.0", "versionType": "firmware" }, { "lessThan": "2.5", "status": "affected", "version": "2.4.16", "versionType": "firmware" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Armando Huesca Prida" }, { "lang": "en", "type": "finder", "value": "Marco Negro" }, { "lang": "en", "type": "finder", "value": "Antonio Carriero" }, { "lang": "en", "type": "finder", "value": "Vito Pistillo" }, { "lang": "en", "type": "finder", "value": "Davide Renna" }, { "lang": "en", "type": "finder", "value": "Manuel Leone" }, { "lang": "en", "type": "finder", "value": "Massimiliano Brolli" }, { "lang": "en", "type": "reporter", "value": "TIM Security Red Team Research" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in Microchip TimeProvider 4100 (banner config modules) allows Cross-Site Scripting (XSS).\u003cp\u003eThis issue affects TimeProvider 4100: from 1.0 before 2.4.7.\u003c/p\u003e" } ], "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in Microchip TimeProvider 4100 (banner config modules) allows Cross-Site Scripting (XSS).This issue affects TimeProvider 4100: from 1.0 before 2.4.7." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "YES", "Recovery": "USER", "Safety": "PRESENT", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "attackVector": "ADJACENT", "baseScore": 7.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "GREEN", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:P/AU:Y/R:U/V:D/U:Green", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-23T15:13:13.627Z", "orgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "shortName": "Microchip" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-stored-xss-vulnerability-in-banner" }, { "tags": [ "third-party-advisory" ], "url": "https://www.gruppotim.it/it/footer/red-team.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Separate the access to the management port and the timing service ports into separate networks with appropriate access controls." } ], "value": "Separate the access to the management port and the timing service ports into separate networks with appropriate access controls." } ], "source": { "advisory": "PSIRT-84", "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-27T11:03:00.000Z", "value": "Reported" } ], "title": "XSS vulnerability in bannerconfig endpoint in TimeProvider 4100", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "It\n is important to note that the web interface is only available on a \nphysically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitation.\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n \n\n\u003c/div\u003e" } ], "value": "It\n is important to note that the web interface is only available on a \nphysically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitation." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5", "assignerShortName": "Microchip", "cveId": "CVE-2024-43687", "datePublished": "2024-10-04T19:41:15.354Z", "dateReserved": "2024-08-14T15:39:44.265Z", "dateUpdated": "2025-05-23T15:13:13.627Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }