First published: Sat Aug 10 2024(Updated: )
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability through a url parameter in Enphase IQ Gateway (formerly known as Envoy) allows File Manipulation. The endpoint requires authentication.This issue affects Envoy: from 4.x to 8.0 and < 8.2.4225.
Credit: csirt@divd.nl
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Enphase IQ Gateway Firmware | >=4.0<8.2.4225 | |
Enphase IQ Gateway Firmware |
Devices are remotely being updated by the vendor.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21877 is considered a high-severity vulnerability due to its potential for file manipulation.
To mitigate CVE-2024-21877, ensure your Enphase IQ Gateway firmware is updated to version 8.2.4225 or later.
CVE-2024-21877 affects Enphase IQ Gateway firmware versions from 4.x to below 8.2.4225.
CVE-2024-21877 is a Path Traversal vulnerability that allows unauthorized file manipulation.
Yes, exploiting CVE-2024-21877 requires authentication to the Enphase IQ Gateway.