Risk | High |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2024-39373 CVE-2024-39374 CVE-2024-39375 CVE-2024-39376 |
CWE-ID | CWE-77 CWE-798 CWE-603 CWE-284 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Markoni-D (Compact) FM Transmitters Hardware solutions / Firmware Markoni-DH (Exciter+Amplifiers) FM Transmitters Hardware solutions / Firmware |
Vendor | marKoni |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU93494
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-39373
CWE-ID:
CWE-77 - Command injection
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The vulnerability exists due to improper input validation. A remote unauthenticated attacker can manipulate the settings and execute arbitrary commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMarkoni-D (Compact) FM Transmitters: before 2.0.1
Markoni-DH (Exciter+Amplifiers) FM Transmitters: before 2.0.1
CPE2.3https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93495
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-39374
CWE-ID:
CWE-798 - Use of Hard-coded Credentials
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain full access to vulnerable system.
The vulnerability exists due to presence of hard-coded credentials in application code. A remote unauthenticated attacker can access the affected system using the hard-coded credentials.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMarkoni-D (Compact) FM Transmitters: before 2.0.1
Markoni-DH (Exciter+Amplifiers) FM Transmitters: before 2.0.1
CPE2.3https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93496
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-39375
CWE-ID:
CWE-603 - Use of Client-Side Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to use of client-side authentication. A remote attacker can bypass authentication and gain administrator privileges.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMarkoni-D (Compact) FM Transmitters: before 2.0.1
Markoni-DH (Exciter+Amplifiers) FM Transmitters: before 2.0.1
CPE2.3https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93497
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-39376
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMarkoni-D (Compact) FM Transmitters: before 2.0.1
Markoni-DH (Exciter+Amplifiers) FM Transmitters: before 2.0.1
CPE2.3https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.