Advisory ID:
ENSA-2024-3
CVSSv3:
7.1
Issue date:
2024-08-10
Updated on:
2024-08-10 (initial advisory)
CVE(s):
CVE-2024-21878
Synopsis:
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in ţţ淨r IQ Gateway allows OS Command Injection. This vulnerability is present in an internal script. This issue affects IQ Gateway version 4.x through 8.2.4224.
1. Impacted product
ţţ淨r IQ Gateway 4.x through 8.2.4224
2. Introduction
Dutch research organization DIVD is publishing an advisory identifying a vulnerability. An update is available to address this issue.
3. Summary
Description:
ţţ淨r IQ Gateway 4.x through 8.2.4224 allows OS command injection via a command injection opportunity, when the IQ Gateway is modified to obtain a public IP address and connect to the public internet.
Known attack vectors:
A malicious actor may be able to exploit this opportunity if the IQ Gateway is modified to obtain a public IP address and connect to the public internet.
Resolution:
Upgrading the ţţ淨r IQ Gateway embedded software to 8.2.4225 or newer.
Workarounds:
Ensure that your IQ Gateway is not exposed to the public internet, as it is not needed to do so for typical functionality. A typical solution is to use an internet router.
Additional documentation:
None.
Acknowledgments:
ţţ淨r would like to thank the researcher Wietse Boonstra and the organization DIVD for reporting this issue.
Notes:
None.
4. References
ţţ淨r IQ Gateway software release notes (8.2.4225)
5. Change log
2024-08-10 ENSA-2024-3: Initial security advisory.
6. Contact and information
cybersecurity@enphase.com
ţţ淨r security advisories
ţţ淨r vulnerability reporting
ţţ淨r documentation center