A vulnerability has been identified in InterMesh 7177 Hybrid 2.0 Subscriber (All versions < V8.2.12), InterMesh 7707 Fire Subscriber (All versions < V7.2.12 only if the IP interface is enabled (which is not the default configuration)). The web server of affected devices does not sanitize the input parameters in specific GET requests that allow for code execution on operating system level. In combination with other vulnerabilities (CVE-2024-47902, CVE-2024-47903, CVE-2024-47904) this could allow an unauthenticated remote attacker to execute arbitrary code with root privileges.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Oct 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Siemens intermesh 7177 Hybrid 2.0 Subscriber
Siemens intermesh 7707 Fire Subscriber Firmware |
|
CPEs | cpe:2.3:h:siemens:intermesh_7177_hybrid_2.0_subscriber:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:intermesh_7707_fire_subscriber:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:intermesh_7177_hybrid_2.0_subscriber:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:intermesh_7707_fire_subscriber_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Siemens intermesh 7177 Hybrid 2.0 Subscriber
Siemens intermesh 7707 Fire Subscriber Firmware |
Wed, 23 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Siemens
Siemens intermesh 7177 Hybrid2.0 Subscriber Siemens intermesh 7707 Fire Subscriber |
|
CPEs | cpe:2.3:a:siemens:intermesh_7177_hybrid2.0_subscriber:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:intermesh_7707_fire_subscriber:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Siemens
Siemens intermesh 7177 Hybrid2.0 Subscriber Siemens intermesh 7707 Fire Subscriber |
|
Metrics |
ssvc
|
Wed, 23 Oct 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified in InterMesh 7177 Hybrid 2.0 Subscriber (All versions < V8.2.12), InterMesh 7707 Fire Subscriber (All versions < V7.2.12 only if the IP interface is enabled (which is not the default configuration)). The web server of affected devices does not sanitize the input parameters in specific GET requests that allow for code execution on operating system level. In combination with other vulnerabilities (CVE-2024-47902, CVE-2024-47903, CVE-2024-47904) this could allow an unauthenticated remote attacker to execute arbitrary code with root privileges. | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-10-23T18:18:54.551Z
Reserved: 2024-10-04T16:15:00.391Z
Link: CVE-2024-47901

Updated: 2024-10-23T18:18:50.333Z

Status : Analyzed
Published: 2024-10-23T15:15:30.930
Modified: 2024-10-30T15:39:47.430
Link: CVE-2024-47901

No data.