CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-21879: URL parameter manipulations allows an authenticated attacker to execute arbitrary OS commands in Enphase IQ Gateway v4.x to v8.x and < v8.2.4225

8.7 CVSS

Description

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.

Classification

CVE ID: CVE-2024-21879

CVSS Base Severity: HIGH

CVSS Base Score: 8.7

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/S:P/AU:Y/R:I/V:C/RE:H

Problem Types

CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

Affected Products

Vendor: Enphase

Product: Envoy

Exploit Prediction Scoring System (EPSS)

EPSS Score: 1.57% (probability of being exploited)

EPSS Percentile: 79.94% (scored less or equal to compared to others)

EPSS Date: 2025-04-09 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: total

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-21879
https://csirt.divd.nl/CVE-2024-21879
https://csirt.divd.nl/DIVD-2024-00011
https://enphase.com/cybersecurity/advisories/ensa-2024-4

Timeline