Today > vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-39364

Sept. 30, 2024, 12:45 p.m.

CVSS Score

6.3 / 10

Product(s) Impacted

Advantech ADAM-5630

Description

Advantech ADAM-5630 has built-in commands that can be executed without authenticating the user. These commands allow for restarting the operating system, rebooting the hardware, and stopping the execution. The commands can be sent to a simple HTTP request and are executed by the device automatically, without discrimination of origin or level of privileges of the user sending the commands.

Weaknesses

CWE-306
Missing Authentication for Critical Function

The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.

CWE ID: 306

Date

Published: Sept. 27, 2024, 6:15 p.m.

Last Modified: Sept. 30, 2024, 12:45 p.m.

Status : Awaiting Analysis

CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.

More info

Source

ics-cert@hq.dhs.gov

CVSS Data

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

Base Score
6.3
Exploitability Score
2.1
Impact Score
4.2
Base Severity
MEDIUM
CVSS Vector String

The CVSS vector string provides an in-depth view of the vulnerability metrics.

View Vector String

CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H

References

https://www.cisa.gov/ ics-cert@hq.dhs.gov