{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-5246","assignerOrgId":"99f1926a-a320-47d8-bbb5-42feb611262e","state":"PUBLISHED","assignerShortName":"zdi","dateReserved":"2024-05-22T21:06:59.213Z","datePublished":"2024-05-23T22:07:15.475Z","dateUpdated":"2024-08-01T21:03:11.154Z"},"containers":{"cna":{"providerMetadata":{"orgId":"99f1926a-a320-47d8-bbb5-42feb611262e","shortName":"zdi","dateUpdated":"2024-05-23T22:07:15.475Z"},"title":"NETGEAR ProSAFE Network Management System Tomcat Remote Code Execution Vulnerability","descriptions":[{"lang":"en","value":"NETGEAR ProSAFE Network Management System Tomcat Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the product installer. The issue results from the use of a vulnerable version of Apache Tomcat. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-22868."}],"affected":[{"vendor":"NETGEAR","product":"ProSAFE Network Management System","versions":[{"version":"1.7.0.34 x64","status":"affected"}],"defaultStatus":"unknown"}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-1395","description":"CWE-1395: Dependency on Vulnerable Third-Party Component","type":"CWE"}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-24-497/","name":"ZDI-24-497","tags":["x_research-advisory"]},{"url":"https://kb.netgear.com/000066164/Security-Advisory-for-Multiple-Vulnerabilities-on-the-NMS300-PSV-2024-0003-PSV-2024-0004","name":"vendor-provided URL","tags":["vendor-advisory"]}],"dateAssigned":"2024-05-22T21:06:59.239Z","datePublic":"2024-05-22T23:32:36.807Z","source":{"lang":"en","value":"191bb9f9c7b3a89d5a586e15299e24417a4aca4d"},"metrics":[{"format":"CVSS","cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH"}}]},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2024-5246","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-05-24T19:21:20.249999Z"}}}],"affected":[{"cpes":["cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*"],"vendor":"netgear","product":"prosafe_network_management_system","versions":[{"status":"affected","version":"1.7.0.34 x64"}],"defaultStatus":"affected"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T18:02:38.927Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:03:11.154Z"},"title":"CVE Program Container","references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-24-497/","name":"ZDI-24-497","tags":["x_research-advisory","x_transferred"]},{"url":"https://kb.netgear.com/000066164/Security-Advisory-for-Multiple-Vulnerabilities-on-the-NMS300-PSV-2024-0003-PSV-2024-0004","name":"vendor-provided URL","tags":["vendor-advisory","x_transferred"]}]}]}}