A potential attacker with access to the Westermo Lynx device may be able to execute malicious code that could affect the correct functioning of the device.
Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2023-50024 | A potential attacker with access to the Westermo Lynx device may be able to execute malicious code that could affect the correct functioning of the device. | 
Fixes
    Solution
No solution given by the vendor.
Workaround
Westermo recommends following best practices for hardening, such as restricting access, disable unused services (attack surface reduction), etc., to mitigate the reported vulnerabilities. The reported code injection vulnerability will be mitigated in a future report.
References
        History
                    No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-19T20:23:15.940Z
Reserved: 2023-10-12T20:21:27.722Z
Link: CVE-2023-45735
Updated: 2024-08-02T20:29:31.595Z
Status : Modified
Published: 2024-02-06T22:16:14.240
Modified: 2024-11-21T08:27:16.590
Link: CVE-2023-45735
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD