CVE-2024-51304

Improper Neutralization of Special Elements used in a Command ('Command Injection') (CWE-77)

Published: Oct 30, 2024 / Updated: 20d ago

010
CVSS 8.8EPSS 0.04%High
CVE info copied to clipboard

Summary

In Draytek Vigor3900 version 1.5.1.3, there is a vulnerability that allows attackers to inject malicious commands into the mainfunction.cgi file and execute arbitrary commands by exploiting the ldap_search_dn function. This is a command injection vulnerability, classified as CWE-77 (Improper Neutralization of Special Elements used in a Command).

Impact

The impact of this vulnerability is severe. Attackers can execute arbitrary commands on the affected system, potentially leading to complete system compromise. The CVSS v3.1 base score is 8.8 (High), with high impacts on confidentiality, integrity, and availability. This indicates that successful exploitation could result in unauthorized access to sensitive information, modification of system files or data, and potential disruption of services. The attack vector is network-based, requiring low attack complexity and only low privileges, with no user interaction needed, making it relatively easy for attackers to exploit.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

As of the current information provided, there is no mention of an available patch. The vulnerability affects Draytek Vigor3900 version 1.5.1.3, and users should monitor Draytek's official channels for any security updates or patches that address this specific issue.

Mitigation

Until a patch is available, consider the following mitigation strategies: 1. Restrict network access to the affected Draytek Vigor3900 devices, especially from untrusted networks. 2. Implement strong network segmentation to isolate affected devices. 3. Monitor logs and network traffic for suspicious activities related to the mainfunction.cgi file or ldap_search_dn function. 4. If possible, disable or restrict access to the vulnerable ldap_search_dn function. 5. Regularly update and patch the Draytek Vigor3900 firmware as soon as security updates become available. 6. Consider using Web Application Firewalls (WAF) or similar security appliances to filter potentially malicious requests targeting the vulnerable components.

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-51304

Oct 30, 2024 at 1:15 PM
First Article

Feedly found the first article mentioning CVE-2024-51304. See article

Oct 30, 2024 at 1:22 PM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 30, 2024 at 1:22 PM
CVSS

A CVSS base score of 8.8 has been assigned.

Oct 30, 2024 at 6:40 PM / nvd
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.9%)

Oct 31, 2024 at 10:14 AM
Static CVE Timeline Graph

Affected Systems

Draytek/vigor3900
+null more

Attack Patterns

CAPEC-136: LDAP Injection
+null more

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI