First published: Sat Aug 10 2024(Updated: )
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.
Credit: csirt@divd.nl
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Enphase IQ Gateway Firmware | >=4.0<8.2.4225 | |
Enphase IQ Gateway Firmware |
Devices are remotely being updated by the vendor.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21879 is rated as a high-severity vulnerability due to its potential for OS command injection.
To mitigate CVE-2024-21879, upgrade the Enphase IQ Gateway firmware to version 8.2.4225 or later.
CVE-2024-21879 affects Enphase IQ Gateway firmware versions from 4.x to below 8.2.4225.
CVE-2024-21879 is classified as a command injection vulnerability arising from improper neutralization of special elements.
CVE-2024-21879 could allow an attacker to execute arbitrary operating system commands on the affected Enphase IQ Gateway.