5.7

CVE-2024-28023

A vulnerability exists in the message queueing mechanism that if 
exploited can lead to the exposure of resources or functionality to 
unintended actors, possibly providing attackers with sensitive information or even execute arbitrary code.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerHitachi Energy
Produkt FOXMAN-UN
Default Statusunaffected
Version FOXMAN-UN R16B PC2
Status affected
Version <= FOXMAN-UN R16B PC4
Version FOXMAN-UN R16B PC3
Status unaffected
Version FOXMAN-UN R15B PC4
Status affected
Version FOXMAN-UN R15B PC5
Status unaffected
HerstellerHitachi Energy
Produkt UNEM
Default Statusunaffected
Version UNEM R16B PC2
Status affected
Version <= UNEM R16B PC4
Version UNEM R16B PC3
Status unaffected
Version UNEM R15B PC4
Status affected
Version UNEM R15B PC4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.028
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
cybersecurity@hitachienergy.com 5.7 1.5 3.7
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L
CWE-259 Use of Hard-coded Password

The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.