Lucene search

K
cve[email protected]CVE-2024-22366
HistoryJan 24, 2024 - 5:15 a.m.

CVE-2024-22366

2024-01-2405:15:13
CWE-78
web.nvd.nist.gov
8
cve-2024-22366
yamaha
wireless lan
access point
security vulnerability
debug code
os command execution
configuration alteration.

6.8 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.7%

Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device’s management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier.

Affected configurations

Vulners
NVD
Node
yamahawlx222MatchRe24.00.03
OR
yamahawlx413MatchRe22.00.05
OR
yamahawlx212MatchRe21.00.12
OR
yamahawlx313MatchRe18.00.12
OR
yamahawlx202MatchRe16.00.18
VendorProductVersionCPE
yamahawlx222Re24.00.03cpe:2.3:h:yamaha:wlx222:Re24.00.03:*:*:*:*:*:*:*
yamahawlx413Re22.00.05cpe:2.3:h:yamaha:wlx413:Re22.00.05:*:*:*:*:*:*:*
yamahawlx212Re21.00.12cpe:2.3:h:yamaha:wlx212:Re21.00.12:*:*:*:*:*:*:*
yamahawlx313Re18.00.12cpe:2.3:h:yamaha:wlx313:Re18.00.12:*:*:*:*:*:*:*
yamahawlx202Re16.00.18cpe:2.3:h:yamaha:wlx202:Re16.00.18:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Yamaha Corporation",
    "product": "WLX222",
    "versions": [
      {
        "version": "firmware Rev.24.00.03 and earlier",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Yamaha Corporation",
    "product": "WLX413",
    "versions": [
      {
        "version": "firmware Rev.22.00.05 and earlier",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Yamaha Corporation",
    "product": "WLX212",
    "versions": [
      {
        "version": "firmware Rev.21.00.12 and earlier",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Yamaha Corporation",
    "product": "WLX313",
    "versions": [
      {
        "version": "firmware Rev.18.00.12 and earlier",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Yamaha Corporation",
    "product": "WLX202",
    "versions": [
      {
        "version": "firmware Rev.16.00.18 and earlier",
        "status": "affected"
      }
    ]
  }
]

6.8 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.7%

Related for CVE-2024-22366