Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could give attackers the ability to force Ruijie's proxy servers to perform any request the attackers choose. Using this, attackers could access internal services used by Ruijie and their internal cloud infrastructure via AWS cloud metadata services.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01 | Third Party Advisory US Government Resource |
Configurations
History
10 Dec 2024, 19:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01 - Third Party Advisory, US Government Resource | |
First Time |
Ruijienetworks
Ruijienetworks reyee Os |
|
CPE | cpe:2.3:o:ruijienetworks:reyee_os:*:*:*:*:*:*:*:* |
06 Dec 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-06 19:15
Updated : 2024-12-10 19:44
NVD link : CVE-2024-48874
Mitre link : CVE-2024-48874
CVE.ORG link : CVE-2024-48874
JSON object : View
Products Affected
ruijienetworks
- reyee_os
CWE
CWE-918
Server-Side Request Forgery (SSRF)