Vulnerability Description
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Enphase | Iq Gateway Firmware | >= 4.0, < 8.2.4225 |
| Enphase | Iq Gateway | - |
Related Weaknesses (CWE)
References
- https://csirt.divd.nl/CVE-2024-21879Third Party Advisory
- https://csirt.divd.nl/DIVD-2024-00011Third Party Advisory
- https://enphase.com/cybersecurity/advisories/ensa-2024-4Vendor Advisory
FAQ
What is CVE-2024-21879?
CVE-2024-21879 is a vulnerability with a CVSS score of 8.8 (HIGH). Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) a...
How severe is CVE-2024-21879?
CVE-2024-21879 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-21879?
Check the references section above for vendor advisories and patch information. Affected products include: Enphase Iq Gateway Firmware, Enphase Iq Gateway.