All the vulnerabilites related to Intelbras - InControl
cve-2025-4286
Vulnerability from cvelistv5
Published
2025-05-05 19:31
Modified
2025-05-05 20:05
Summary
Intelbras InControl Dispositivos Edição Page credentials storage
Impacted products
IntelbrasInControl
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-4286",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-05T20:05:08.952078Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-05T20:05:12.475Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Dispositivos Edi\u00e7\u00e3o Page"
          ],
          "product": "InControl",
          "vendor": "Intelbras",
          "versions": [
            {
              "status": "affected",
              "version": "2.21.0"
            },
            {
              "status": "affected",
              "version": "2.21.1"
            },
            {
              "status": "affected",
              "version": "2.21.2"
            },
            {
              "status": "affected",
              "version": "2.21.3"
            },
            {
              "status": "affected",
              "version": "2.21.4"
            },
            {
              "status": "affected",
              "version": "2.21.5"
            },
            {
              "status": "affected",
              "version": "2.21.6"
            },
            {
              "status": "affected",
              "version": "2.21.7"
            },
            {
              "status": "affected",
              "version": "2.21.8"
            },
            {
              "status": "affected",
              "version": "2.21.9"
            },
            {
              "status": "affected",
              "version": "2.21.10"
            },
            {
              "status": "affected",
              "version": "2.21.11"
            },
            {
              "status": "affected",
              "version": "2.21.12"
            },
            {
              "status": "affected",
              "version": "2.21.13"
            },
            {
              "status": "affected",
              "version": "2.21.14"
            },
            {
              "status": "affected",
              "version": "2.21.15"
            },
            {
              "status": "affected",
              "version": "2.21.16"
            },
            {
              "status": "affected",
              "version": "2.21.17"
            },
            {
              "status": "affected",
              "version": "2.21.18"
            },
            {
              "status": "affected",
              "version": "2.21.19"
            },
            {
              "status": "affected",
              "version": "2.21.20"
            },
            {
              "status": "affected",
              "version": "2.21.21"
            },
            {
              "status": "affected",
              "version": "2.21.22"
            },
            {
              "status": "affected",
              "version": "2.21.23"
            },
            {
              "status": "affected",
              "version": "2.21.24"
            },
            {
              "status": "affected",
              "version": "2.21.25"
            },
            {
              "status": "affected",
              "version": "2.21.26"
            },
            {
              "status": "affected",
              "version": "2.21.27"
            },
            {
              "status": "affected",
              "version": "2.21.28"
            },
            {
              "status": "affected",
              "version": "2.21.29"
            },
            {
              "status": "affected",
              "version": "2.21.30"
            },
            {
              "status": "affected",
              "version": "2.21.31"
            },
            {
              "status": "affected",
              "version": "2.21.32"
            },
            {
              "status": "affected",
              "version": "2.21.33"
            },
            {
              "status": "affected",
              "version": "2.21.34"
            },
            {
              "status": "affected",
              "version": "2.21.35"
            },
            {
              "status": "affected",
              "version": "2.21.36"
            },
            {
              "status": "affected",
              "version": "2.21.37"
            },
            {
              "status": "affected",
              "version": "2.21.38"
            },
            {
              "status": "affected",
              "version": "2.21.39"
            },
            {
              "status": "affected",
              "version": "2.21.40"
            },
            {
              "status": "affected",
              "version": "2.21.41"
            },
            {
              "status": "affected",
              "version": "2.21.42"
            },
            {
              "status": "affected",
              "version": "2.21.43"
            },
            {
              "status": "affected",
              "version": "2.21.44"
            },
            {
              "status": "affected",
              "version": "2.21.45"
            },
            {
              "status": "affected",
              "version": "2.21.46"
            },
            {
              "status": "affected",
              "version": "2.21.47"
            },
            {
              "status": "affected",
              "version": "2.21.48"
            },
            {
              "status": "affected",
              "version": "2.21.49"
            },
            {
              "status": "affected",
              "version": "2.21.50"
            },
            {
              "status": "affected",
              "version": "2.21.51"
            },
            {
              "status": "affected",
              "version": "2.21.52"
            },
            {
              "status": "affected",
              "version": "2.21.53"
            },
            {
              "status": "affected",
              "version": "2.21.54"
            },
            {
              "status": "affected",
              "version": "2.21.55"
            },
            {
              "status": "affected",
              "version": "2.21.56"
            },
            {
              "status": "affected",
              "version": "2.21.57"
            },
            {
              "status": "affected",
              "version": "2.21.58"
            },
            {
              "status": "affected",
              "version": "2.21.59"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "eldruin (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in Intelbras InControl up to 2.21.59. It has been classified as problematic. Affected is an unknown function of the component Dispositivos Edi\u00e7\u00e3o Page. The manipulation of the argument Senha de Comunica\u00e7\u00e3o leads to unprotected storage of credentials. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. According to the vendor this issue should be fixed in a later release."
        },
        {
          "lang": "de",
          "value": "Es wurde eine problematische Schwachstelle in Intelbras InControl bis 2.21.59 ausgemacht. Es geht dabei um eine nicht klar definierte Funktion der Komponente Dispositivos Edi\u00e7\u00e3o Page. Durch Manipulieren des Arguments Senha de Comunica\u00e7\u00e3o mit unbekannten Daten kann eine unprotected storage of credentials-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 3.3,
            "vectorString": "AV:N/AC:L/Au:M/C:P/I:N/A:N",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-256",
              "description": "Unprotected Storage of Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-255",
              "description": "Credentials Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-05T19:31:04.865Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-307392 | Intelbras InControl Dispositivos Edi\u00e7\u00e3o Page credentials storage",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.307392"
        },
        {
          "name": "VDB-307392 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.307392"
        },
        {
          "name": "Submit #483834 | Intelbras InControl 2.21.57 Insecure Storage of Sensitive Information",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.483834"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://eldruin.notion.site/Intelbras-InControl-v2-21-57-Storing-password-in-insecure-format-17d27474cccb8003b647ea832186b162?pvs=4"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-05-05T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2025-05-05T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2025-05-05T13:51:11.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Intelbras InControl Dispositivos Edi\u00e7\u00e3o Page credentials storage"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2025-4286",
    "datePublished": "2025-05-05T19:31:04.865Z",
    "dateReserved": "2025-05-05T11:46:08.317Z",
    "dateUpdated": "2025-05-05T20:05:12.475Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2025-0784
Vulnerability from cvelistv5
Published
2025-01-28 20:00
Modified
2025-02-12 20:01
Summary
Intelbras InControl Registered User usuario cleartext transmission
Impacted products
IntelbrasInControl
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0784",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T20:32:08.923755Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-12T20:01:10.799Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Registered User Handler"
          ],
          "product": "InControl",
          "vendor": "Intelbras",
          "versions": [
            {
              "status": "affected",
              "version": "2.21.0"
            },
            {
              "status": "affected",
              "version": "2.21.1"
            },
            {
              "status": "affected",
              "version": "2.21.2"
            },
            {
              "status": "affected",
              "version": "2.21.3"
            },
            {
              "status": "affected",
              "version": "2.21.4"
            },
            {
              "status": "affected",
              "version": "2.21.5"
            },
            {
              "status": "affected",
              "version": "2.21.6"
            },
            {
              "status": "affected",
              "version": "2.21.7"
            },
            {
              "status": "affected",
              "version": "2.21.8"
            },
            {
              "status": "affected",
              "version": "2.21.9"
            },
            {
              "status": "affected",
              "version": "2.21.10"
            },
            {
              "status": "affected",
              "version": "2.21.11"
            },
            {
              "status": "affected",
              "version": "2.21.12"
            },
            {
              "status": "affected",
              "version": "2.21.13"
            },
            {
              "status": "affected",
              "version": "2.21.14"
            },
            {
              "status": "affected",
              "version": "2.21.15"
            },
            {
              "status": "affected",
              "version": "2.21.16"
            },
            {
              "status": "affected",
              "version": "2.21.17"
            },
            {
              "status": "affected",
              "version": "2.21.18"
            },
            {
              "status": "affected",
              "version": "2.21.19"
            },
            {
              "status": "affected",
              "version": "2.21.20"
            },
            {
              "status": "affected",
              "version": "2.21.21"
            },
            {
              "status": "affected",
              "version": "2.21.22"
            },
            {
              "status": "affected",
              "version": "2.21.23"
            },
            {
              "status": "affected",
              "version": "2.21.24"
            },
            {
              "status": "affected",
              "version": "2.21.25"
            },
            {
              "status": "affected",
              "version": "2.21.26"
            },
            {
              "status": "affected",
              "version": "2.21.27"
            },
            {
              "status": "affected",
              "version": "2.21.28"
            },
            {
              "status": "affected",
              "version": "2.21.29"
            },
            {
              "status": "affected",
              "version": "2.21.30"
            },
            {
              "status": "affected",
              "version": "2.21.31"
            },
            {
              "status": "affected",
              "version": "2.21.32"
            },
            {
              "status": "affected",
              "version": "2.21.33"
            },
            {
              "status": "affected",
              "version": "2.21.34"
            },
            {
              "status": "affected",
              "version": "2.21.35"
            },
            {
              "status": "affected",
              "version": "2.21.36"
            },
            {
              "status": "affected",
              "version": "2.21.37"
            },
            {
              "status": "affected",
              "version": "2.21.38"
            },
            {
              "status": "affected",
              "version": "2.21.39"
            },
            {
              "status": "affected",
              "version": "2.21.40"
            },
            {
              "status": "affected",
              "version": "2.21.41"
            },
            {
              "status": "affected",
              "version": "2.21.42"
            },
            {
              "status": "affected",
              "version": "2.21.43"
            },
            {
              "status": "affected",
              "version": "2.21.44"
            },
            {
              "status": "affected",
              "version": "2.21.45"
            },
            {
              "status": "affected",
              "version": "2.21.46"
            },
            {
              "status": "affected",
              "version": "2.21.47"
            },
            {
              "status": "affected",
              "version": "2.21.48"
            },
            {
              "status": "affected",
              "version": "2.21.49"
            },
            {
              "status": "affected",
              "version": "2.21.50"
            },
            {
              "status": "affected",
              "version": "2.21.51"
            },
            {
              "status": "affected",
              "version": "2.21.52"
            },
            {
              "status": "affected",
              "version": "2.21.53"
            },
            {
              "status": "affected",
              "version": "2.21.54"
            },
            {
              "status": "affected",
              "version": "2.21.55"
            },
            {
              "status": "affected",
              "version": "2.21.56"
            },
            {
              "status": "affected",
              "version": "2.21.57"
            },
            {
              "status": "affected",
              "version": "2.21.58"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "eldruin (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been found in Intelbras InControl up to 2.21.58 and classified as problematic. This vulnerability affects unknown code of the file /v1/usuario/ of the component Registered User Handler. The manipulation leads to cleartext transmission of sensitive information. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.21.59 is able to address this issue. It is recommended to upgrade the affected component."
        },
        {
          "lang": "de",
          "value": "In Intelbras InControl bis 2.21.58 wurde eine problematische Schwachstelle gefunden. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /v1/usuario/ der Komponente Registered User Handler. Durch Beeinflussen mit unbekannten Daten kann eine cleartext transmission of sensitive information-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Das Ausnutzen gilt als schwierig. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 2.21.59 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 2.6,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-319",
              "description": "Cleartext Transmission of Sensitive Information",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-310",
              "description": "Cryptographic Issues",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-28T20:00:13.220Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-293908 | Intelbras InControl Registered User usuario cleartext transmission",
          "tags": [
            "vdb-entry"
          ],
          "url": "https://vuldb.com/?id.293908"
        },
        {
          "name": "VDB-293908 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.293908"
        },
        {
          "name": "Submit #483835 | Intelbras InControl 2.21.57 Cleartext Transmission of Sensitive Information",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.483835"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://eldruin.notion.site/Intelbras-InControl-v2-21-57-Password-exposed-in-clear-text-17d27474cccb806fba1efda195c78258?pvs=4"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-01-28T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2025-01-28T01:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2025-01-28T15:05:34.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Intelbras InControl Registered User usuario cleartext transmission"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2025-0784",
    "datePublished": "2025-01-28T20:00:13.220Z",
    "dateReserved": "2025-01-28T13:59:47.508Z",
    "dateUpdated": "2025-02-12T20:01:10.799Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2025-6765
Vulnerability from cvelistv5
Published
2025-06-27 12:00
Modified
2025-06-27 13:00
Summary
Intelbras InControl HTTP PUT Request operador permission
References
https://vuldb.com/?id.314075vdb-entry
https://vuldb.com/?ctiid.314075signature, permissions-required
https://vuldb.com/?submit.599873third-party-advisory
https://vuldb.com/?submit.599880third-party-advisory
Impacted products
IntelbrasInControl
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-6765",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-27T12:59:57.761608Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-27T13:00:14.193Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://vuldb.com/?submit.599873"
          },
          {
            "tags": [
              "exploit"
            ],
            "url": "https://vuldb.com/?submit.599880"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "HTTP PUT Request Handler"
          ],
          "product": "InControl",
          "vendor": "Intelbras",
          "versions": [
            {
              "status": "affected",
              "version": "2.21.60.9"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "lorenzomoulin (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability, which was classified as critical, has been found in Intelbras InControl 2.21.60.9. This issue affects some unknown processing of the file /v1/operador/ of the component HTTP PUT Request Handler. The manipulation leads to permission issues. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        },
        {
          "lang": "de",
          "value": "Eine Schwachstelle wurde in Intelbras InControl 2.21.60.9 entdeckt. Sie wurde als kritisch eingestuft. Davon betroffen ist unbekannter Code der Datei /v1/operador/ der Komponente HTTP PUT Request Handler. Durch die Manipulation mit unbekannten Daten kann eine permission issues-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 6.5,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-275",
              "description": "Permission Issues",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-266",
              "description": "Incorrect Privilege Assignment",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-27T12:00:15.432Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-314075 | Intelbras InControl HTTP PUT Request operador permission",
          "tags": [
            "vdb-entry"
          ],
          "url": "https://vuldb.com/?id.314075"
        },
        {
          "name": "VDB-314075 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.314075"
        },
        {
          "name": "Submit #599873 | Intelbras InControl 2.21.60.9 Improper Handling of Insufficient Permissions or Privileges",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.599873"
        },
        {
          "name": "Submit #599880 | Intelbras InControl  2.21.60.9 IDOR (Duplicate)",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.599880"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-06-27T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2025-06-27T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2025-06-27T07:53:54.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Intelbras InControl HTTP PUT Request operador permission"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2025-6765",
    "datePublished": "2025-06-27T12:00:15.432Z",
    "dateReserved": "2025-06-27T05:48:40.764Z",
    "dateUpdated": "2025-06-27T13:00:14.193Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-9324
Vulnerability from cvelistv5
Published
2024-09-29 07:00
Modified
2024-11-04 19:13
Summary
Intelbras InControl Relatório de Operadores Page operador code injection
Impacted products
IntelbrasInControl
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-9324",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-30T19:19:49.189731Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-30T19:20:23.044Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Relat\u00f3rio de Operadores Page"
          ],
          "product": "InControl",
          "vendor": "Intelbras",
          "versions": [
            {
              "status": "affected",
              "version": "2.21.0"
            },
            {
              "status": "affected",
              "version": "2.21.1"
            },
            {
              "status": "affected",
              "version": "2.21.2"
            },
            {
              "status": "affected",
              "version": "2.21.3"
            },
            {
              "status": "affected",
              "version": "2.21.4"
            },
            {
              "status": "affected",
              "version": "2.21.5"
            },
            {
              "status": "affected",
              "version": "2.21.6"
            },
            {
              "status": "affected",
              "version": "2.21.7"
            },
            {
              "status": "affected",
              "version": "2.21.8"
            },
            {
              "status": "affected",
              "version": "2.21.9"
            },
            {
              "status": "affected",
              "version": "2.21.10"
            },
            {
              "status": "affected",
              "version": "2.21.11"
            },
            {
              "status": "affected",
              "version": "2.21.12"
            },
            {
              "status": "affected",
              "version": "2.21.13"
            },
            {
              "status": "affected",
              "version": "2.21.14"
            },
            {
              "status": "affected",
              "version": "2.21.15"
            },
            {
              "status": "affected",
              "version": "2.21.16"
            },
            {
              "status": "affected",
              "version": "2.21.17"
            },
            {
              "status": "affected",
              "version": "2.21.18"
            },
            {
              "status": "affected",
              "version": "2.21.19"
            },
            {
              "status": "affected",
              "version": "2.21.20"
            },
            {
              "status": "affected",
              "version": "2.21.21"
            },
            {
              "status": "affected",
              "version": "2.21.22"
            },
            {
              "status": "affected",
              "version": "2.21.23"
            },
            {
              "status": "affected",
              "version": "2.21.24"
            },
            {
              "status": "affected",
              "version": "2.21.25"
            },
            {
              "status": "affected",
              "version": "2.21.26"
            },
            {
              "status": "affected",
              "version": "2.21.27"
            },
            {
              "status": "affected",
              "version": "2.21.28"
            },
            {
              "status": "affected",
              "version": "2.21.29"
            },
            {
              "status": "affected",
              "version": "2.21.30"
            },
            {
              "status": "affected",
              "version": "2.21.31"
            },
            {
              "status": "affected",
              "version": "2.21.32"
            },
            {
              "status": "affected",
              "version": "2.21.33"
            },
            {
              "status": "affected",
              "version": "2.21.34"
            },
            {
              "status": "affected",
              "version": "2.21.35"
            },
            {
              "status": "affected",
              "version": "2.21.36"
            },
            {
              "status": "affected",
              "version": "2.21.37"
            },
            {
              "status": "affected",
              "version": "2.21.38"
            },
            {
              "status": "affected",
              "version": "2.21.39"
            },
            {
              "status": "affected",
              "version": "2.21.40"
            },
            {
              "status": "affected",
              "version": "2.21.41"
            },
            {
              "status": "affected",
              "version": "2.21.42"
            },
            {
              "status": "affected",
              "version": "2.21.43"
            },
            {
              "status": "affected",
              "version": "2.21.44"
            },
            {
              "status": "affected",
              "version": "2.21.45"
            },
            {
              "status": "affected",
              "version": "2.21.46"
            },
            {
              "status": "affected",
              "version": "2.21.47"
            },
            {
              "status": "affected",
              "version": "2.21.48"
            },
            {
              "status": "affected",
              "version": "2.21.49"
            },
            {
              "status": "affected",
              "version": "2.21.50"
            },
            {
              "status": "affected",
              "version": "2.21.51"
            },
            {
              "status": "affected",
              "version": "2.21.52"
            },
            {
              "status": "affected",
              "version": "2.21.53"
            },
            {
              "status": "affected",
              "version": "2.21.54"
            },
            {
              "status": "affected",
              "version": "2.21.55"
            },
            {
              "status": "affected",
              "version": "2.21.56"
            },
            {
              "status": "affected",
              "version": "2.21.57"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Stux (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in Intelbras InControl up to 2.21.57. It has been rated as critical. Affected by this issue is some unknown functionality of the file /v1/operador/ of the component Relat\u00f3rio de Operadores Page. The manipulation of the argument fields leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.21.58 is able to address this issue. It is recommended to upgrade the affected component. The vendor was informed early on 2024-07-19 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20."
        },
        {
          "lang": "de",
          "value": "Eine kritische Schwachstelle wurde in Intelbras InControl bis 2.21.57 ausgemacht. Betroffen davon ist ein unbekannter Prozess der Datei /v1/operador/ der Komponente Relat\u00f3rio de Operadores Page. Dank der Manipulation des Arguments fields mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 2.21.58 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 6.5,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "Code Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-74",
              "description": "Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-707",
              "description": "Improper Neutralization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T19:13:08.178Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-278828 | Intelbras InControl Relat\u00f3rio de Operadores Page operador code injection",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.278828"
        },
        {
          "name": "VDB-278828 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.278828"
        },
        {
          "name": "Submit #375614 | Intelbras InControl 2.21.57 (last version) Command Injection",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.375614"
        },
        {
          "tags": [
            "media-coverage"
          ],
          "url": "https://youtu.be/UdZVktPUy8A"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://backend.intelbras.com/sites/default/files/2024-10/Aviso%20de%20Seguran%C3%A7a%20-%20Incontrol%202.21.56%20e%202.21.57.pdf"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://download.cronos.intelbras.com.br/download/INCONTROL/INCONTROL-WEB/prod/INCONTROL-WEB-2.21.58-233dfd1ac1e2ca3eabb71c854005c78b.exe"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-09-28T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2024-09-28T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2024-11-04T20:16:24.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Intelbras InControl Relat\u00f3rio de Operadores Page operador code injection"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2024-9324",
    "datePublished": "2024-09-29T07:00:05.883Z",
    "dateReserved": "2024-09-28T13:28:09.234Z",
    "dateUpdated": "2024-11-04T19:13:08.178Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-6080
Vulnerability from cvelistv5
Published
2024-06-17 23:00
Modified
2024-11-04 19:13
Summary
Intelbras InControl incontrolWebcam Service unquoted search path
Impacted products
IntelbrasInControl
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:intelbras:incontrol:2.21.56:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "incontrol",
            "vendor": "intelbras",
            "versions": [
              {
                "status": "affected",
                "version": "2.21.56"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-6080",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-11T17:14:02.847171Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-12T15:53:52.800Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:25:03.365Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VDB-268822 | Intelbras InControl unquoted search path",
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?id.268822"
          },
          {
            "name": "VDB-268822 | CTI Indicators (IOB, IOC, TTP)",
            "tags": [
              "signature",
              "permissions-required",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?ctiid.268822"
          },
          {
            "name": "Submit #353502 | Intelbras InControl 2.21.56 Unquoted Service Path via \"incontrolWebcam\" Service",
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://vuldb.com/?submit.353502"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "incontrolWebcam Service"
          ],
          "product": "InControl",
          "vendor": "Intelbras",
          "versions": [
            {
              "status": "affected",
              "version": "2.21.56"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Stux (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability classified as critical was found in Intelbras InControl 2.21.56. This vulnerability affects unknown code of the component incontrolWebcam Service. The manipulation leads to unquoted search path. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 2.21.58 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early about this disclosure and plans to provide a solution within the next few weeks."
        },
        {
          "lang": "de",
          "value": "In Intelbras InControl 2.21.56 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Komponente incontrolWebcam Service. Durch Manipulation mit unbekannten Daten kann eine unquoted search path-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 2.21.58 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 6.8,
            "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-428",
              "description": "Unquoted Search Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-426",
              "description": "Untrusted Search Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T19:13:12.474Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-268822 | Intelbras InControl incontrolWebcam Service unquoted search path",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.268822"
        },
        {
          "name": "VDB-268822 | CTI Indicators (IOB, IOC, TTP)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.268822"
        },
        {
          "name": "Submit #353502 | Intelbras InControl 2.21.56 Unquoted Service Path via \"incontrolWebcam\" Service",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.353502"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://backend.intelbras.com/sites/default/files/2024-10/Aviso%20de%20Seguran%C3%A7a%20-%20Incontrol%202.21.56%20e%202.21.57.pdf"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://download.cronos.intelbras.com.br/download/INCONTROL/INCONTROL-WEB/prod/INCONTROL-WEB-2.21.58-233dfd1ac1e2ca3eabb71c854005c78b.exe"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-06-17T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2024-06-17T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2024-11-04T20:17:38.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Intelbras InControl incontrolWebcam Service unquoted search path"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2024-6080",
    "datePublished": "2024-06-17T23:00:05.125Z",
    "dateReserved": "2024-06-17T16:52:16.498Z",
    "dateUpdated": "2024-11-04T19:13:12.474Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-9325
Vulnerability from cvelistv5
Published
2024-09-29 07:31
Modified
2024-11-04 19:13
Summary
Intelbras InControl incontrol-service-watchdog.exe unquoted search path
Impacted products
IntelbrasInControl
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:intelbras:incontrol:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "incontrol",
            "vendor": "intelbras",
            "versions": [
              {
                "lessThanOrEqual": "2.21.56",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-9325",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-30T19:34:40.235187Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-30T19:37:52.776Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "InControl",
          "vendor": "Intelbras",
          "versions": [
            {
              "status": "affected",
              "version": "2.21.0"
            },
            {
              "status": "affected",
              "version": "2.21.1"
            },
            {
              "status": "affected",
              "version": "2.21.2"
            },
            {
              "status": "affected",
              "version": "2.21.3"
            },
            {
              "status": "affected",
              "version": "2.21.4"
            },
            {
              "status": "affected",
              "version": "2.21.5"
            },
            {
              "status": "affected",
              "version": "2.21.6"
            },
            {
              "status": "affected",
              "version": "2.21.7"
            },
            {
              "status": "affected",
              "version": "2.21.8"
            },
            {
              "status": "affected",
              "version": "2.21.9"
            },
            {
              "status": "affected",
              "version": "2.21.10"
            },
            {
              "status": "affected",
              "version": "2.21.11"
            },
            {
              "status": "affected",
              "version": "2.21.12"
            },
            {
              "status": "affected",
              "version": "2.21.13"
            },
            {
              "status": "affected",
              "version": "2.21.14"
            },
            {
              "status": "affected",
              "version": "2.21.15"
            },
            {
              "status": "affected",
              "version": "2.21.16"
            },
            {
              "status": "affected",
              "version": "2.21.17"
            },
            {
              "status": "affected",
              "version": "2.21.18"
            },
            {
              "status": "affected",
              "version": "2.21.19"
            },
            {
              "status": "affected",
              "version": "2.21.20"
            },
            {
              "status": "affected",
              "version": "2.21.21"
            },
            {
              "status": "affected",
              "version": "2.21.22"
            },
            {
              "status": "affected",
              "version": "2.21.23"
            },
            {
              "status": "affected",
              "version": "2.21.24"
            },
            {
              "status": "affected",
              "version": "2.21.25"
            },
            {
              "status": "affected",
              "version": "2.21.26"
            },
            {
              "status": "affected",
              "version": "2.21.27"
            },
            {
              "status": "affected",
              "version": "2.21.28"
            },
            {
              "status": "affected",
              "version": "2.21.29"
            },
            {
              "status": "affected",
              "version": "2.21.30"
            },
            {
              "status": "affected",
              "version": "2.21.31"
            },
            {
              "status": "affected",
              "version": "2.21.32"
            },
            {
              "status": "affected",
              "version": "2.21.33"
            },
            {
              "status": "affected",
              "version": "2.21.34"
            },
            {
              "status": "affected",
              "version": "2.21.35"
            },
            {
              "status": "affected",
              "version": "2.21.36"
            },
            {
              "status": "affected",
              "version": "2.21.37"
            },
            {
              "status": "affected",
              "version": "2.21.38"
            },
            {
              "status": "affected",
              "version": "2.21.39"
            },
            {
              "status": "affected",
              "version": "2.21.40"
            },
            {
              "status": "affected",
              "version": "2.21.41"
            },
            {
              "status": "affected",
              "version": "2.21.42"
            },
            {
              "status": "affected",
              "version": "2.21.43"
            },
            {
              "status": "affected",
              "version": "2.21.44"
            },
            {
              "status": "affected",
              "version": "2.21.45"
            },
            {
              "status": "affected",
              "version": "2.21.46"
            },
            {
              "status": "affected",
              "version": "2.21.47"
            },
            {
              "status": "affected",
              "version": "2.21.48"
            },
            {
              "status": "affected",
              "version": "2.21.49"
            },
            {
              "status": "affected",
              "version": "2.21.50"
            },
            {
              "status": "affected",
              "version": "2.21.51"
            },
            {
              "status": "affected",
              "version": "2.21.52"
            },
            {
              "status": "affected",
              "version": "2.21.53"
            },
            {
              "status": "affected",
              "version": "2.21.54"
            },
            {
              "status": "affected",
              "version": "2.21.55"
            },
            {
              "status": "affected",
              "version": "2.21.56"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "j369 (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability classified as critical has been found in Intelbras InControl up to 2.21.56. This affects an unknown part of the file C:\\Program Files (x86)\\Intelbras\\Incontrol Cliente\\incontrol_webcam\\incontrol-service-watchdog.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. Upgrading to version 2.21.58 is able to address this issue. It is recommended to upgrade the affected component. The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20."
        },
        {
          "lang": "de",
          "value": "Es wurde eine Schwachstelle in Intelbras InControl bis 2.21.56 entdeckt. Sie wurde als kritisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei C:\\Program Files (x86)\\Intelbras\\Incontrol Cliente\\incontrol_webcam\\incontrol-service-watchdog.exe. Dank Manipulation mit unbekannten Daten kann eine unquoted search path-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen. Ein Aktualisieren auf die Version 2.21.58 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 6.8,
            "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-428",
              "description": "Unquoted Search Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-426",
              "description": "Untrusted Search Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T19:13:10.172Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-278829 | Intelbras InControl incontrol-service-watchdog.exe unquoted search path",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.278829"
        },
        {
          "name": "VDB-278829 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.278829"
        },
        {
          "name": "Submit #385397 | Intelbras InControl 2.21.56 Unquoted Search Path",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.385397"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://backend.intelbras.com/sites/default/files/2024-10/Aviso%20de%20Seguran%C3%A7a%20-%20Incontrol%202.21.56%20e%202.21.57.pdf"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://download.cronos.intelbras.com.br/download/INCONTROL/INCONTROL-WEB/prod/INCONTROL-WEB-2.21.58-233dfd1ac1e2ca3eabb71c854005c78b.exe"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-09-28T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2024-09-28T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2024-11-04T20:17:01.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Intelbras InControl incontrol-service-watchdog.exe unquoted search path"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2024-9325",
    "datePublished": "2024-09-29T07:31:04.316Z",
    "dateReserved": "2024-09-28T13:30:20.245Z",
    "dateUpdated": "2024-11-04T19:13:10.172Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}