cve-2024-22372
Vulnerability from cvelistv5
Published
2024-01-24 04:38
Modified
2025-02-17 05:36
Summary
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:43:34.541Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.elecom.co.jp/news/security/20240123-01/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jvn.jp/en/vu/JVNVU90908488/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "WRC-X1500GS-B",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.11 and earlier",
                  },
               ],
            },
            {
               product: "WRC-X1500GSA-B",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.11 and earlier",
                  },
               ],
            },
            {
               product: "WRC-X1800GS-B",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.17 and earlier",
                  },
               ],
            },
            {
               product: "WRC-X1800GSA-B",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.17 and earlier",
                  },
               ],
            },
            {
               product: "WRC-X1800GSH-B",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.17 and earlier",
                  },
               ],
            },
            {
               product: "WRC-X3000GS2-B",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.08 and earlier",
                  },
               ],
            },
            {
               product: "WRC-X3000GS2-W",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.08 and earlier",
                  },
               ],
            },
            {
               product: "WRC-X3000GS2A-B",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.08 and earlier",
                  },
               ],
            },
            {
               product: "WRC-XE5400GS-G",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.12 and earlier",
                  },
               ],
            },
            {
               product: "WRC-XE5400GSA-G",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.12 and earlier",
                  },
               ],
            },
            {
               product: "WRC-X6000QS-G",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.13 and earlier",
                  },
               ],
            },
            {
               product: "WRC-X6000QSA-G",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.13 and earlier",
                  },
               ],
            },
            {
               product: "WRC-X6000XS-G",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.09",
                  },
               ],
            },
            {
               product: "WRC-X6000XST-G",
               vendor: "ELECOM CO.,LTD.",
               versions: [
                  {
                     status: "affected",
                     version: "v1.12 and earlier",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 6.8,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en-US",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-78",
                     description: "Improper neutralization of special elements used in an OS command ('OS Command Injection')",
                     lang: "en-US",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-02-17T05:36:13.734Z",
            orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce",
            shortName: "jpcert",
         },
         references: [
            {
               url: "https://www.elecom.co.jp/news/security/20240123-01/",
            },
            {
               url: "https://jvn.jp/en/vu/JVNVU90908488/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce",
      assignerShortName: "jpcert",
      cveId: "CVE-2024-22372",
      datePublished: "2024-01-24T04:38:20.199Z",
      dateReserved: "2024-01-10T00:47:14.234Z",
      dateUpdated: "2025-02-17T05:36:13.734Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-22372\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2024-01-24T05:15:14.137\",\"lastModified\":\"2025-02-17T06:15:12.283\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product.\"},{\"lang\":\"es\",\"value\":\"La vulnerabilidad de inyección de comandos del sistema operativo en los routers LAN inalámbricos ELECOM permite que un atacante adyacente a la red con privilegios administrativos ejecute comandos arbitrarios del sistema operativo enviando una solicitud especialmente manipulada al producto. Los productos y versiones afectados son los siguientes: WRC-X1800GS-B v1.17 y anteriores, WRC-X1800GSA-B v1.17 y anteriores, WRC-X1800GSH-B v1.17 y anteriores, WRC-X6000XS-G v1.09, y WRC-X6000XST-G v1.12 y anteriores.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"vultures@jpcert.or.jp\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"vultures@jpcert.or.jp\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-x1800gs-b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.18\",\"matchCriteriaId\":\"220801B5-B278-4E27-BD38-065589867B0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-x1800gs-b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95667B22-5F8C-4774-9E69-2F4B9AF595AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-x1800gsh-b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.18\",\"matchCriteriaId\":\"F0044554-9055-4E59-AB4A-3891B30F619F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-x1800gsh-b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20EA8B33-784F-44E8-B215-DC2554709100\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-x1800gsa-b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.18\",\"matchCriteriaId\":\"69B61005-B1C7-465E-9F11-4B28E9007E77\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-x1800gsa-b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3842FA46-4CA2-4ECE-8632-2C74E8D97CDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-x6000xs-g_firmware:1.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A07383D-5AFE-4114-9E9C-DDAC5874080E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-x6000xs-g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D50F2091-30D4-4A3E-A28A-B9D67D70DB2C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:elecom:wrc-x6000xst-g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.14\",\"matchCriteriaId\":\"51ABE063-E986-4392-AB2D-7CF83045CA13\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:elecom:wrc-x6000xst-g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E07D50B-4182-4947-BC6B-B4718F498548\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/vu/JVNVU90908488/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.elecom.co.jp/news/security/20240123-01/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/en/vu/JVNVU90908488/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.elecom.co.jp/news/security/20240123-01/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.