A potential attacker with access to the Westermo Lynx device may be able to execute malicious code that could affect the correct functioning of the device.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-50024 | A potential attacker with access to the Westermo Lynx device may be able to execute malicious code that could affect the correct functioning of the device. |
Solution
No solution given by the vendor.
Workaround
Westermo recommends following best practices for hardening, such as restricting access, disable unused services (attack surface reduction), etc., to mitigate the reported vulnerabilities. The reported code injection vulnerability will be mitigated in a future report.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-19T20:23:15.940Z
Reserved: 2023-10-12T20:21:27.722Z
Link: CVE-2023-45735
Updated: 2024-08-02T20:29:31.595Z
Status : Modified
Published: 2024-02-06T22:16:14.240
Modified: 2024-11-21T08:27:16.590
Link: CVE-2023-45735
No data.
OpenCVE Enrichment
No data.
EUVD