A potential attacker with access to the Westermo Lynx device would be able to execute malicious code that could affect the correct functioning of the device.
No analysis available yet.
Vendor Workaround
Westermo recommends following best practices for hardening, such as restricting access, disable unused services (attack surface reduction), etc., to mitigate the reported vulnerabilities.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-49520 | A potential attacker with access to the Westermo Lynx device would be able to execute malicious code that could affect the correct functioning of the device. |
Thu, 15 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-05-15T19:43:25.845Z
Reserved: 2023-10-12T20:21:27.727Z
Link: CVE-2023-45213
Updated: 2024-08-02T20:14:20.095Z
Status : Modified
Published: 2024-02-06T22:16:13.697
Modified: 2024-11-21T08:26:33.810
Link: CVE-2023-45213
No data.
OpenCVE Enrichment
No data.
EUVD