Sploit.io - Search

Product: n-cloud_firmware, version: -

CVE-2024-4301

Severity: HIGH

Description: N-Reporter and N-Cloud, products of the N-Partner, have an OS Command Injection vulnerability. Remote attackers with normal user privilege can execute arbitrary system commands by manipulating user inputs on a specific page.

CVSS Score: 8.8

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000430000
  • Percentile: 0.114770000
  • Date: 2025-01-14

ExploitDB

No data available.

HackerOne Data

  • Rank: 7454
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • N-Partner N-Reporter firmware - Versions: earlier
    • N-Partner N-Cloud firmware - Versions: earlier

    References:

    Risk Assessment

    1. Risk Assessment
    The CVE-2024-4301 vulnerability is a high-severity OS Command Injection flaw affecting N-Reporter and N-Cloud products from N-Partner. This vulnerability allows remote attackers with normal user privileges to execute arbitrary system commands by manipulating user inputs on a specific page. The CVSS score of 8.8 (HIGH) underscores the critical nature of this issue, with high impacts on confidentiality, integrity, and availability. The attack complexity is low, and no user interaction is required, making it relatively easy to exploit. The potential business impact is significant, as successful exploitation could lead to complete system compromise, data breaches, and disruption of services. The likelihood of exploitation is moderate, given the low privileges required and the public availability of vulnerability details.

    2. Potential Attack Scenarios
    An attacker with access to a normal user account on the N-Reporter or N-Cloud system could exploit this vulnerability by crafting malicious inputs on a specific page. For example, the attacker could inject a command into a form field or API parameter that is passed to the underlying operating system without proper sanitization. This could allow the attacker to execute commands such as downloading and running malware, exfiltrating sensitive data, or modifying system configurations. The attack process would involve identifying the vulnerable input field, crafting the malicious payload, and executing it to gain control over the system. The potential outcomes include unauthorized access to sensitive data, disruption of services, and further lateral movement within the network.

    3. Mitigation Recommendations
    The primary mitigation for this vulnerability is to update the firmware of N-Reporter and N-Cloud to version 6.1.187 (20240216-1603) or later, as recommended by the vendor. Organizations should immediately identify and patch affected systems. Additionally, input validation and sanitization should be implemented to prevent command injection attacks. Network segmentation and access controls can limit the exposure of vulnerable systems. Monitoring and logging of user activities can help detect and respond to potential exploitation attempts. For further details, refer to the vendor's advisory at https://www.twcert.org.tw/tw/cp-132-7776-035ff-1.html.

    4. Executive Summary
    CVE-2024-4301 is a critical vulnerability in N-Reporter and N-Cloud products that allows attackers with normal user privileges to execute arbitrary system commands. This poses a significant risk to business operations, as it could lead to data breaches, service disruptions, and complete system compromise. The vulnerability is relatively easy to exploit, and immediate action is required to mitigate the risk. Organizations should prioritize updating affected systems to the latest firmware version and implement additional security measures such as input validation and network segmentation. Addressing this vulnerability is essential to protect sensitive data, maintain service availability, and prevent potential regulatory and reputational damage.