HIGH · 8.8

CVE-2024-21879

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) a...

Vulnerability Description

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.

CVSS Score

8.8

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
EnphaseIq Gateway Firmware>= 4.0, < 8.2.4225
EnphaseIq Gateway-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2024-21879?

CVE-2024-21879 is a vulnerability with a CVSS score of 8.8 (HIGH). Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) a...

How severe is CVE-2024-21879?

CVE-2024-21879 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2024-21879?

Check the references section above for vendor advisories and patch information. Affected products include: Enphase Iq Gateway Firmware, Enphase Iq Gateway.