8.8

CVE-2024-29082

Improper access control vulnerability affecting Vonets

 industrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 
and prior, enables an unauthenticated remote attacker to bypass 
authentication and factory reset the device via unprotected goform 
endpoints.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VonetsVar1200-h Firmware Version <= 3.3.23.6.9
   VonetsVar1200-h Version-
VonetsVar1200-l Firmware Version <= 3.3.23.6.9
   VonetsVar1200-l Version-
VonetsVar600-h Firmware Version <= 3.3.23.6.9
   VonetsVar600-h Version-
VonetsVap11ac Firmware Version <= 3.3.23.6.9
   VonetsVap11ac Version-
VonetsVap11g-500s Firmware Version <= 3.3.23.6.9
   VonetsVap11g-500s Version-
VonetsVbg1200 Firmware Version <= 3.3.23.6.9
   VonetsVbg1200 Version-
VonetsVap11s-5g Firmware Version <= 3.3.23.6.9
   VonetsVap11s-5g Version-
VonetsVap11s Firmware Version <= 3.3.23.6.9
   VonetsVap11s Version-
VonetsVar11n-300 Firmware Version <= 3.3.23.6.9
   VonetsVar11n-300 Version-
VonetsVap11g-300 Firmware Version <= 3.3.23.6.9
   VonetsVap11g-300 Version-
VonetsVap11n-300 Firmware Version <= 3.3.23.6.9
   VonetsVap11n-300 Version-
VonetsVap11g Firmware Version <= 3.3.23.6.9
   VonetsVap11g Version-
VonetsVap11g-500 Firmware Version <= 3.3.23.6.9
   VonetsVap11g-500 Version-
VonetsVga-1000 Firmware Version <= 3.3.23.6.9
   VonetsVga-1000 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.2
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.6 3.9 4.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
ics-cert@hq.dhs.gov 8.8 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
ics-cert@hq.dhs.gov 8.6 3.9 4.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.