Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
Products
Envoy
- 4.x
- 5.x
Source
csirt@divd.nl
Tags
CVE-2024-21881 details
Published : Aug. 12, 2024, 1:38 p.m.
Last Modified : Aug. 12, 2024, 1:41 p.m.
Last Modified : Aug. 12, 2024, 1:41 p.m.
Description
Inadequate Encryption Strength vulnerability allow an authenticated attacker to execute arbitrary OS Commands via encrypted package upload.This issue affects Envoy: 4.x and 5.x
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-326 | Inadequate Encryption Strength | The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required. |
References
URL | Source |
---|---|
https://csirt.divd.nl/CVE-2024-21881 | csirt@divd.nl |
https://csirt.divd.nl/DIVD-2024-00011 | csirt@divd.nl |
https://enphase.com/cybersecurity/advisories/ensa-2024-6 | csirt@divd.nl |
This website uses the NVD API, but is not approved or certified by it.