6.4
CVE-2025-48468
- EPSS 0.02%
- Veröffentlicht 24.06.2025 02:16:21
- Zuletzt bearbeitet 09.07.2025 15:20:29
- Quelle 5f57b9bf-260d-4433-bf07-b6a79e
- CVE-Watchlists
- Unerledigt
Successful exploitation of the vulnerability could allow an attacker that has physical access to interface with JTAG to inject or modify firmware.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Advantech ≫ Wise-4010lan Firmware Version2.02b00
Advantech ≫ Wise-4050lan Firmware Version2.02b00
Advantech ≫ Wise-4060lan Firmware Version2.02b00
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.042 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 5f57b9bf-260d-4433-bf07-b6a79e9bb7d4 | 6.4 | 0.5 | 5.9 |
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-1191 On-Chip Debug and Test Interface With Improper Access Control
The chip does not implement or does not correctly perform access control to check whether users are authorized to access internal registers and test modes through the physical debug/test interface.