An attacker with access to the network where the affected devices are located could maliciously actions to obtain, via a sniffer, sensitive information exchanged via TCP communications.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-45115 | An attacker with access to the network where the affected devices are located could maliciously actions to obtain, via a sniffer, sensitive information exchanged via TCP communications. |
Fixes
Solution
No solution given by the vendor.
Workaround
Westermo recommends following best practices for hardening, such as restricting access, disable unused services (attack surface reduction), etc., to mitigate the reported vulnerabilities.
References
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-02T18:38:50.381Z
Reserved: 2023-10-12T20:21:27.757Z
Link: CVE-2023-40544
Updated: 2024-08-02T18:38:50.381Z
Status : Modified
Published: 2024-02-06T22:16:13.337
Modified: 2024-11-21T08:19:41.167
Link: CVE-2023-40544
No data.
OpenCVE Enrichment
No data.
EUVD