CVSS 3.1 Score 7.3 of 10 (high)


Published Jan 30, 2024
Updated: Feb 8, 2024


CVE-2024-21488 is a cyber vulnerability that affects versions of the package network before 0.7.0. The vulnerability is an Arbitrary Command Injection, caused by the use of the child_process exec function without input sanitization. If an attacker-controlled user inputs data into the mac_address_for function, they can execute arbitrary commands on the operating system where this package is running. The vulnerability has a base severity of HIGH and a base score of 7.3 according to CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. The potential danger it poses to an organization is significant, as it allows attackers to execute commands on the affected system, potentially leading to unauthorized access or control over sensitive data and systems. To remediate this vulnerability, users should update their network package to version 0.7.0 or newer, which includes the necessary input sanitization to prevent command injection attacks.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-21488 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options