CVE-2024-22182 (GCVE-0-2024-22182)

Vulnerability from cvelistv5 – Published: 2024-03-01 20:52 – Updated: 2024-08-12 20:25 Unsupported When Assigned
VLAI?
Title
Commend WS203VICM Argument Injection
Summary
A remote, unauthenticated attacker may be able to send crafted messages to the web server of the Commend WS203VICM causing the system to restart, interrupting service.
CWE
Assigner
Impacted products
Vendor Product Version
Commend WS203VICM Affected: 0 , ≤ 1.7 (custom)
Create a notification for this product.
Credits
Aarón Flecha Menéndez of S21sec reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T22:35:34.932Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-01"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://clibrary-online.commend.com/en/cyber-security/security-advisories.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:commend:ws203vicm_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ws203vicm_firmware",
            "vendor": "commend",
            "versions": [
              {
                "lessThanOrEqual": "1.7",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-22182",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-04T19:32:08.452696Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-12T20:25:02.479Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WS203VICM",
          "vendor": "Commend",
          "versions": [
            {
              "lessThanOrEqual": "1.7",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Aar\u00f3n Flecha Men\u00e9ndez of S21sec reported these vulnerabilities to CISA."
        }
      ],
      "datePublic": "2024-02-20T20:48:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\nA remote, unauthenticated attacker may be able to send crafted messages \nto the web server of the Commend WS203VICM causing the system to \nrestart, interrupting service.\n\n"
            }
          ],
          "value": "A remote, unauthenticated attacker may be able to send crafted messages \nto the web server of the Commend WS203VICM causing the system to \nrestart, interrupting service.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Argument Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-01T20:52:59.597Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-01"
        },
        {
          "url": "https://clibrary-online.commend.com/en/cyber-security/security-advisories.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\nAlthough this is an end-of-life product, Commend has created new firmware \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://clibrary-online.commend.com/\"\u003eversion WS-CM 2.0\u003c/a\u003e\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;to\n address the first two issues. The new firmware can be loaded via the \nprogram \"IP Station Config\". To install the firmware, follow the \ninstructions below:\u003c/span\u003e\u003col\u003e\n\u003cli\u003eLog in to the Commend web-portal.\u003c/li\u003e\n\u003cli\u003eDownload and extract the \"Terminals Software Package\".\u003c/li\u003e\n\u003cli\u003eIn \"IP Station Config\", select the stations to be updated in the table.\u003c/li\u003e\n\u003cli\u003eGo to: Menu Station \u0026gt; Firmware Download\u003c/li\u003e\n\u003cli\u003eSelect the file \"WS-CM 2.0.geh\" from the folder \"WS-CM\" and click on the button Open.\u003c/li\u003e\n\u003c/ol\u003e\n\u003cp\u003eFor additional information, please visit \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://clibrary-online.commend.com/en/cyber-security/security-advisories.html\"\u003eCSA-2024-42 on Commend\u0027s cybersecurity website.\u003c/a\u003e\u003c/p\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "Although this is an end-of-life product, Commend has created new firmware  version WS-CM 2.0 https://clibrary-online.commend.com/ \u00a0\u00a0to\n address the first two issues. The new firmware can be loaded via the \nprogram \"IP Station Config\". To install the firmware, follow the \ninstructions below:\n  *  Log in to the Commend web-portal.\n\n  *  Download and extract the \"Terminals Software Package\".\n\n  *  In \"IP Station Config\", select the stations to be updated in the table.\n\n  *  Go to: Menu Station \u003e Firmware Download\n\n  *  Select the file \"WS-CM 2.0.geh\" from the folder \"WS-CM\" and click on the button Open.\n\n\nFor additional information, please visit  CSA-2024-42 on Commend\u0027s cybersecurity website. https://clibrary-online.commend.com/en/cyber-security/security-advisories.html \n\n\n\n\n"
        }
      ],
      "source": {
        "advisory": "ICSA-24-051-01",
        "discovery": "EXTERNAL"
      },
      "tags": [
        "unsupported-when-assigned"
      ],
      "title": "Commend WS203VICM Argument Injection",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-22182",
    "datePublished": "2024-03-01T20:52:59.597Z",
    "dateReserved": "2024-01-30T22:06:32.541Z",
    "dateUpdated": "2024-08-12T20:25:02.479Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-22182\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2024-03-01T21:15:08.167\",\"lastModified\":\"2024-11-21T08:55:44.573\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[{\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"unsupported-when-assigned\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A remote, unauthenticated attacker may be able to send crafted messages \\nto the web server of the Commend WS203VICM causing the system to \\nrestart, interrupting service.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Un atacante remoto y no autenticado puede enviar mensajes manipulados al servidor web del Commend WS203VICM, lo que provoca que el sistema se reinicie e interrumpa el servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.7}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-88\"}]}],\"references\":[{\"url\":\"https://clibrary-online.commend.com/en/cyber-security/security-advisories.html\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-01\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"https://clibrary-online.commend.com/en/cyber-security/security-advisories.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-01\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://clibrary-online.commend.com/en/cyber-security/security-advisories.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T22:35:34.932Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-22182\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-04T19:32:08.452696Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:commend:ws203vicm_firmware:*:*:*:*:*:*:*:*\"], \"vendor\": \"commend\", \"product\": \"ws203vicm_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.7\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-12T20:24:21.035Z\"}}], \"cna\": {\"tags\": [\"unsupported-when-assigned\"], \"title\": \"Commend WS203VICM Argument Injection\", \"source\": {\"advisory\": \"ICSA-24-051-01\", \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Aar\\u00f3n Flecha Men\\u00e9ndez of S21sec reported these vulnerabilities to CISA.\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Commend\", \"product\": \"WS203VICM\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.7\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Although this is an end-of-life product, Commend has created new firmware  version WS-CM 2.0 https://clibrary-online.commend.com/ \\u00a0\\u00a0to\\n address the first two issues. The new firmware can be loaded via the \\nprogram \\\"IP Station Config\\\". To install the firmware, follow the \\ninstructions below:\\n  *  Log in to the Commend web-portal.\\n\\n  *  Download and extract the \\\"Terminals Software Package\\\".\\n\\n  *  In \\\"IP Station Config\\\", select the stations to be updated in the table.\\n\\n  *  Go to: Menu Station \u003e Firmware Download\\n\\n  *  Select the file \\\"WS-CM 2.0.geh\\\" from the folder \\\"WS-CM\\\" and click on the button Open.\\n\\n\\nFor additional information, please visit  CSA-2024-42 on Commend\u0027s cybersecurity website. https://clibrary-online.commend.com/en/cyber-security/security-advisories.html \\n\\n\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\nAlthough this is an end-of-life product, Commend has created new firmware \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://clibrary-online.commend.com/\\\"\u003eversion WS-CM 2.0\u003c/a\u003e\u0026nbsp;\u003cspan style=\\\"background-color: var(--wht);\\\"\u003e\u0026nbsp;to\\n address the first two issues. The new firmware can be loaded via the \\nprogram \\\"IP Station Config\\\". To install the firmware, follow the \\ninstructions below:\u003c/span\u003e\u003col\u003e\\n\u003cli\u003eLog in to the Commend web-portal.\u003c/li\u003e\\n\u003cli\u003eDownload and extract the \\\"Terminals Software Package\\\".\u003c/li\u003e\\n\u003cli\u003eIn \\\"IP Station Config\\\", select the stations to be updated in the table.\u003c/li\u003e\\n\u003cli\u003eGo to: Menu Station \u0026gt; Firmware Download\u003c/li\u003e\\n\u003cli\u003eSelect the file \\\"WS-CM 2.0.geh\\\" from the folder \\\"WS-CM\\\" and click on the button Open.\u003c/li\u003e\\n\u003c/ol\u003e\\n\u003cp\u003eFor additional information, please visit \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://clibrary-online.commend.com/en/cyber-security/security-advisories.html\\\"\u003eCSA-2024-42 on Commend\u0027s cybersecurity website.\u003c/a\u003e\u003c/p\u003e\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2024-02-20T20:48:00.000Z\", \"references\": [{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-01\"}, {\"url\": \"https://clibrary-online.commend.com/en/cyber-security/security-advisories.html\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A remote, unauthenticated attacker may be able to send crafted messages \\nto the web server of the Commend WS203VICM causing the system to \\nrestart, interrupting service.\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\nA remote, unauthenticated attacker may be able to send crafted messages \\nto the web server of the Commend WS203VICM causing the system to \\nrestart, interrupting service.\\n\\n\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-88\", \"description\": \"CWE-88 Argument Injection\"}]}], \"providerMetadata\": {\"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\", \"dateUpdated\": \"2024-03-01T20:52:59.597Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-22182\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-12T20:25:02.479Z\", \"dateReserved\": \"2024-01-30T22:06:32.541Z\", \"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"datePublished\": \"2024-03-01T20:52:59.597Z\", \"assignerShortName\": \"icscert\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…