SARA / Free Tools / CVE / CVE-2024-3765

CVE-2024-3765 — A vulnerability classified as critical was found in Xiongmai AHB7804R-MH-V2, AHB

A vulnerability classified as critical was found in Xiongmai AHB7804R-MH-V2, AHB8004T-GL, AHB8008T-GL, AHB7004T-GS-V3, AHB7004T-MHV2, AHB8032F-LME and XM530_R80X30-PQ_8M. Affected by this vulnerability is an unknown functionality of the component Sofia Service. The manipulation w

CVSS
10.0 CISA
EPSS
18.00% (top 60.40%)
CWE
CWE-284
Published
2024-04-14T23:00:05.199Z
Last modified
2024-08-08T20:19:23.996Z
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

01What is this vulnerability?

A vulnerability classified as critical was found in Xiongmai AHB7804R-MH-V2, AHB8004T-GL, AHB8008T-GL, AHB7004T-GS-V3, AHB7004T-MHV2, AHB8032F-LME and XM530_R80X30-PQ_8M. Affected by this vulnerability is an unknown functionality of the component Sofia Service. The manipulation with the input…

02Affected products

VendorProductVersions
XiongmaiAHB7804RMH-V2 — 4.02.R11.24340142.10001.131900.00000, 4.02.R11.A8531149.10001.131900.00000, 4.02.R11.C6380171.11201.141900.00000, 4.03.R11.0000020X.11201.042300.0000005, 4.03.R11.4912720B.11201.142300.0000004, 4.03.R11.4912720D.11201.142300.0000004, 4.03.R11.4915714A.12201.142300.0000000, 5.00.R02.00030751.10010.348717.0000000
XiongmaiAHB8004TGL — 4.02.R11.24340142.10001.131900.00000, 4.02.R11.A8531149.10001.131900.00000, 4.02.R11.C6380171.11201.141900.00000, 4.03.R11.0000020X.11201.042300.0000005, 4.03.R11.4912720B.11201.142300.0000004, 4.03.R11.4912720D.11201.142300.0000004, 4.03.R11.4915714A.12201.142300.0000000, 5.00.R02.00030751.10010.348717.0000000
XiongmaiAHB8008TGL — 4.02.R11.24340142.10001.131900.00000, 4.02.R11.A8531149.10001.131900.00000, 4.02.R11.C6380171.11201.141900.00000, 4.03.R11.0000020X.11201.042300.0000005, 4.03.R11.4912720B.11201.142300.0000004, 4.03.R11.4912720D.11201.142300.0000004, 4.03.R11.4915714A.12201.142300.0000000, 5.00.R02.00030751.10010.348717.0000000
XiongmaiAHB7004TGS-V3 — 4.02.R11.24340142.10001.131900.00000, 4.02.R11.A8531149.10001.131900.00000, 4.02.R11.C6380171.11201.141900.00000, 4.03.R11.0000020X.11201.042300.0000005, 4.03.R11.4912720B.11201.142300.0000004, 4.03.R11.4912720D.11201.142300.0000004, 4.03.R11.4915714A.12201.142300.0000000, 5.00.R02.00030751.10010.348717.0000000
XiongmaiAHB7004TMHV2 — 4.02.R11.24340142.10001.131900.00000, 4.02.R11.A8531149.10001.131900.00000, 4.02.R11.C6380171.11201.141900.00000, 4.03.R11.0000020X.11201.042300.0000005, 4.03.R11.4912720B.11201.142300.0000004, 4.03.R11.4912720D.11201.142300.0000004, 4.03.R11.4915714A.12201.142300.0000000, 5.00.R02.00030751.10010.348717.0000000
XiongmaiAHB8032FLME — 4.02.R11.24340142.10001.131900.00000, 4.02.R11.A8531149.10001.131900.00000, 4.02.R11.C6380171.11201.141900.00000, 4.03.R11.0000020X.11201.042300.0000005, 4.03.R11.4912720B.11201.142300.0000004, 4.03.R11.4912720D.11201.142300.0000004, 4.03.R11.4915714A.12201.142300.0000000, 5.00.R02.00030751.10010.348717.0000000
XiongmaiXM530_R80X30PQ_8M — 4.02.R11.24340142.10001.131900.00000, 4.02.R11.A8531149.10001.131900.00000, 4.02.R11.C6380171.11201.141900.00000, 4.03.R11.0000020X.11201.042300.0000005, 4.03.R11.4912720B.11201.142300.0000004, 4.03.R11.4912720D.11201.142300.0000004, 4.03.R11.4915714A.12201.142300.0000000, 5.00.R02.00030751.10010.348717.0000000

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →