A potential attacker with access to the Westermo Lynx device would be able to execute malicious code that could affect the correct functioning of the device.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-49520 | A potential attacker with access to the Westermo Lynx device would be able to execute malicious code that could affect the correct functioning of the device. |
Solution
No solution given by the vendor.
Workaround
Westermo recommends following best practices for hardening, such as restricting access, disable unused services (attack surface reduction), etc., to mitigate the reported vulnerabilities.
Thu, 15 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-05-15T19:43:25.845Z
Reserved: 2023-10-12T20:21:27.727Z
Link: CVE-2023-45213
Updated: 2024-08-02T20:14:20.095Z
Status : Modified
Published: 2024-02-06T22:16:13.697
Modified: 2024-11-21T08:26:33.810
Link: CVE-2023-45213
No data.
OpenCVE Enrichment
No data.
EUVD