7.2
CVE-2024-2617
- EPSS 0.02%
- Veröffentlicht 30.04.2024 13:15:47
- Zuletzt bearbeitet 21.11.2024 09:10:08
- Quelle cybersecurity@hitachienergy.co
- CVE-Watchlists
- Unerledigt
A vulnerability exists in the RTU500 that allows for authenticated and authorized users to bypass secure update. If a malicious actor successfully exploits this vulnerability, they could use it to update the RTU500 with unsigned firmware.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstellerhitachienergy
≫
Produkt
rtu500_firmware
Default Statusunknown
Version <=
13.2.7.0
Version
13.2.1.0
Status
affected
Herstellerhitachienergy
≫
Produkt
rtu500_firmware
Default Statusunknown
Version <=
13.4.4.0
Version
13.4.1.0
Status
affected
Herstellerhitachienergy
≫
Produkt
rtu500_firmware
Default Statusunknown
Version <=
13.5.3.0
Version
13.5.1.0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.037 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| cybersecurity@hitachienergy.com | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-358 Improperly Implemented Security Check for Standard
The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.