CVE-2024-39275

Oct. 7, 2024, 3:25 p.m.

8.8
High

Description

Cookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a session is closed. Forging requests with a legitimate cookie, even if the session was terminated, allows an unauthorized attacker to act with the same level of privileges of the legitimate user.

Product(s) Impacted

Vendor Product Versions
Advantech
  • Adam-5630 Firmware
  • Adam-5630
  • *
  • -

Weaknesses

CWE-539
Use of Persistent Cookies Containing Sensitive Information
The web application uses persistent cookies, but the cookies contain sensitive information.

*CPE(s)

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o advantech adam-5630_firmware / / / / / / / /
h advantech adam-5630 - / / / / / / /

CVSS Score

8.8 / 10

CVSS Data

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • View Vector String

    CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Date

  • Published: Sept. 27, 2024, 6:15 p.m.
  • Last Modified: Oct. 7, 2024, 3:25 p.m.

Status : Analyzed

CVE has had analysis completed and all data associations made.

More info

Source

ics-cert@hq.dhs.gov

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.