{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T20:03:27.146","vulnerabilities":[{"cve":{"id":"CVE-2024-31408","sourceIdentifier":"vultures@jpcert.or.jp","published":"2024-11-22T02:15:19.480","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"OS command injection vulnerability exists in AIPHONE IX SYSTEM and IXG SYSTEM. A network-adjacent authenticated attacker may execute an arbitrary OS command with root privileges by sending a specially crafted request."},{"lang":"es","value":"Existe una vulnerabilidad de inyección de comandos del sistema operativo en AIPHONE IX SYSTEM y IXG SYSTEM. Un atacante autenticado adyacente a la red puede ejecutar un comando del sistema operativo arbitrario con privilegios de superusuario enviando una solicitud especialmente manipulada."}],"metrics":{"cvssMetricV30":[{"source":"vultures@jpcert.or.jp","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}]},"weaknesses":[{"source":"vultures@jpcert.or.jp","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN41397971/","source":"vultures@jpcert.or.jp"},{"url":"https://www.aiphone.net/important/20241016_1/","source":"vultures@jpcert.or.jp"},{"url":"https://www.aiphone.net/important/20241016_2/","source":"vultures@jpcert.or.jp"},{"url":"https://www.aiphone.net/support/software-documents/ix/","source":"vultures@jpcert.or.jp"},{"url":"https://www.aiphone.net/support/software-documents/ixg/","source":"vultures@jpcert.or.jp"}]}}]}