Lucene search

K
vulnrichmentJpcertVULNRICHMENT:CVE-2024-40617
HistoryJul 17, 2024 - 8:44 a.m.

CVE-2024-40617

2024-07-1708:44:44
jpcert
github.com
2
fujitsu network edgiot gw1500
path traversal vulnerability
remote attacker
sensitive files access

AI Score

6

Confidence

Low

EPSS

0.001

Percentile

19.8%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.

CNA Affected

[
  {
    "vendor": "Fujitsu Limited",
    "product": "FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS)",
    "versions": [
      {
        "status": "affected",
        "version": "prior to V02L19C01"
      }
    ]
  }
]

AI Score

6

Confidence

Low

EPSS

0.001

Percentile

19.8%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-40617