Multiple authenticated operating system (OS) command injection vulnerabilities exist in Firewalla Box Software
versions before 1.979. A physically close
attacker that is authenticated to the Bluetooth Low-Energy (BTLE) interface can use the network configuration service to inject commands in various configuration parameters including networkConfig.Interface.Phy.Eth0.Extra.PingTestIP, networkConfig.Interface.Phy.Eth0.Extra.DNSTestDomain, and networkConfig.Interface.Phy.Eth0.Gateway6. Additionally, because the configuration can be synced to the Firewalla cloud, the attacker may be able to persist access even after hardware resets and firmware re-flashes.
Metrics
Affected Vendors & Products
References
History
Wed, 21 Aug 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 14 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Firewalla
Firewalla box Software |
|
CPEs | cpe:2.3:a:firewalla:box_software:*:*:*:*:*:*:*:* | |
Vendors & Products |
Firewalla
Firewalla box Software |
|
Metrics |
ssvc
|
Mon, 12 Aug 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Multiple authenticated operating system (OS) command injection vulnerabilities exist in Firewalla Box Software versions before 1.979. A physically close attacker that is authenticated to the Bluetooth Low-Energy (BTLE) interface can use the network configuration service to inject commands in various configuration parameters including networkConfig.Interface.Phy.Eth0.Extra.PingTestIP, networkConfig.Interface.Phy.Eth0.Extra.DNSTestDomain, and networkConfig.Interface.Phy.Eth0.Gateway6. Additionally, because the configuration can be synced to the Firewalla cloud, the attacker may be able to persist access even after hardware resets and firmware re-flashes. | |
Title | Firewalla BTLE Authenticated Command Injection | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: VulnCheck
Published: 2024-08-12T18:49:51.384Z
Updated: 2024-08-21T17:13:39.202Z
Reserved: 2024-07-11T17:35:29.595Z
Link: CVE-2024-40893
Vulnrichment
Updated: 2024-08-14T13:26:33.771Z
NVD
Status : Awaiting Analysis
Published: 2024-08-12T19:15:16.643
Modified: 2024-08-21T18:15:09.803
Link: CVE-2024-40893
Redhat
No data.