{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-43684","assignerOrgId":"dc3f6da9-85b5-4a73-84a2-2ec90b40fca5","state":"PUBLISHED","assignerShortName":"Microchip","dateReserved":"2024-08-14T15:39:44.265Z","datePublished":"2024-10-04T19:51:51.926Z","dateUpdated":"2025-08-29T20:11:56.019Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","product":"TimeProvider 4100","vendor":"Microchip","versions":[{"lessThanOrEqual":"2.4.7","status":"affected","version":"1.0","versionType":"firmware"}]}],"credits":[{"lang":"en","type":"finder","value":"Armando Huesca Prida"},{"lang":"en","type":"finder","value":"Marco Negro"},{"lang":"en","type":"finder","value":"Antonio Carriero"},{"lang":"en","type":"finder","value":"Vito Pistillo"},{"lang":"en","type":"finder","value":"Davide Renna"},{"lang":"en","type":"finder","value":"Manuel Leone"},{"lang":"en","type":"finder","value":"Massimiliano Brolli"},{"lang":"en","type":"reporter","value":"TIM Security Red Team Research"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Cross-Site Request Forgery (CSRF) vulnerability in Microchip TimeProvider 4100 allows Cross Site Request Forgery, Cross-Site Scripting (XSS).<p>This issue affects TimeProvider 4100: from 1.0.<br></p>"}],"value":"Cross-Site Request Forgery (CSRF) vulnerability in Microchip TimeProvider 4100 allows Cross Site Request Forgery, Cross-Site Scripting (XSS).This issue affects TimeProvider 4100: from 1.0."}],"impacts":[{"capecId":"CAPEC-62","descriptions":[{"lang":"en","value":"CAPEC-62 Cross Site Request Forgery"}]},{"capecId":"CAPEC-63","descriptions":[{"lang":"en","value":"CAPEC-63 Cross-Site Scripting (XSS)"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"USER","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":8.7,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"AMBER","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"PASSIVE","valueDensity":"CONCENTRATED","vectorString":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H/R:U/V:C/RE:M/U:Amber","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"MODERATE"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"dc3f6da9-85b5-4a73-84a2-2ec90b40fca5","shortName":"Microchip","dateUpdated":"2025-08-29T20:11:56.019Z"},"references":[{"tags":["third-party-advisory"],"url":"https://www.gruppotim.it/it/footer/red-team.html"},{"tags":["vendor-advisory"],"url":"https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-cross-site-request-forgery"}],"source":{"advisory":"PSIRT-87","discovery":"EXTERNAL"},"timeline":[{"lang":"en","time":"2024-06-27T11:03:00.000Z","value":"Reported"}],"title":"Cross-Site Request Forgery vulnerability in TimeProvider 4100","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"It is important to note that the web interface is only available on a \nphysically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitations.<br>"}],"value":"It is important to note that the web interface is only available on a \nphysically separate management port and these vulnerabilities have no \nimpact on the timing service ports. For added security, users have the \noption to disable the web interface, further protecting the device from \npotential web-based exploitations."}],"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"microchip","product":"timeprovider_4100_firmware","cpes":["cpe:2.3:o:microchip:timeprovider_4100_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"2.4.7","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-04T21:24:57.843121Z","id":"CVE-2024-43684","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-04T22:15:36.419Z"}}]}}