Sploit.io - Search

Product: yad-loj_firmware, version: 3.0.561

CVE-2024-32269

Severity: HIGH

Description: An issue in Yonganda YAD-LOJ V3.0.561 allows a remote attacker to cause a denial of service via a crafted packet.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000430000
  • Percentile: 0.110860000
  • Date: 2025-01-09

ExploitDB

No data available.

HackerOne Data

  • Rank: 7450
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • n/a n/a - Versions: n/a

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2024-32269 affects the Yonganda YAD-LOJ V3.0.561 firmware and is classified as a high-severity issue with a CVSS v3.1 score of 7.5. The vulnerability stems from uncontrolled resource consumption (CWE-400), allowing a remote attacker to cause a denial of service (DoS) by sending a crafted packet to the affected device. The attack vector is network-based, requiring no user interaction or privileges, making it relatively easy to exploit. The primary impact is on availability, as the vulnerability can render the device unresponsive, disrupting operations. While there is no direct impact on confidentiality or integrity, the DoS condition can lead to significant operational downtime, affecting business continuity. The EPSS score of 0.000430000 indicates a low likelihood of exploitation in the wild, but the high base severity and ease of exploitation make this a critical issue to address.

    2. Potential Attack Scenarios
    A potential attack scenario involves an attacker leveraging the vulnerability to disrupt the functionality of the Yonganda YAD-LOJ device. The attacker crafts a malicious packet designed to exploit the resource consumption flaw and sends it to the device over the network. Since the attack requires no authentication or user interaction, the attacker can target any exposed device remotely. Upon receiving the crafted packet, the device exhausts its resources, leading to a crash or unresponsiveness. The outcome is a denial of service, rendering the device inoperable. This could be particularly damaging in environments where the device is critical for operations, such as surveillance or industrial control systems, leading to extended downtime and potential safety risks.

    3. Mitigation Recommendations
    Immediate action is required to mitigate this vulnerability. First, organizations should check if they are using the affected Yonganda YAD-LOJ V3.0.561 firmware and isolate any exposed devices from untrusted networks. Contact the vendor, Yonganda, to obtain a patch or firmware update that addresses the vulnerability. If a patch is not immediately available, implement network-level controls such as firewalls or intrusion prevention systems (IPS) to block malicious traffic targeting the device. Regularly monitor network traffic for unusual patterns that may indicate exploitation attempts. For additional guidance, refer to the vendor's documentation and the GitHub reference provided: https://github.com/kzLiu2017/Tuya_Cam_CVE_Doc/blob/main/YAD-LOJ-Camera.pdf.

    4. Executive Summary
    CVE-2024-32269 is a high-severity vulnerability in the Yonganda YAD-LOJ V3.0.561 firmware that allows remote attackers to cause a denial of service by sending a specially crafted packet. This vulnerability poses a significant risk to business operations, as it can render critical devices unresponsive, leading to downtime and potential safety concerns. While the likelihood of exploitation is currently low, the ease of exploitation and high impact on availability make this a pressing issue. Immediate actions include isolating affected devices, applying vendor-provided patches, and implementing network-level protections. Addressing this vulnerability is essential to ensure operational continuity and safeguard against potential disruptions.