CVE-2024-48874

Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could give attackers the ability to force Ruijie's proxy servers to perform any request the attackers choose. Using this, attackers could access internal services used by Ruijie and their internal cloud infrastructure via AWS cloud metadata services.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:o:ruijienetworks:reyee_os:*:*:*:*:*:*:*:*

History

10 Dec 2024, 19:44

Type Values Removed Values Added
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-01 - Third Party Advisory, US Government Resource
First Time Ruijienetworks
Ruijienetworks reyee Os
CPE cpe:2.3:o:ruijienetworks:reyee_os:*:*:*:*:*:*:*:*

06 Dec 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-06 19:15

Updated : 2024-12-10 19:44


NVD link : CVE-2024-48874

Mitre link : CVE-2024-48874

CVE.ORG link : CVE-2024-48874


JSON object : View

Products Affected

ruijienetworks

  • reyee_os
CWE
CWE-918

Server-Side Request Forgery (SSRF)