A remote attacker may be able to bypass access control of Commend WS203VICM by creating a malicious request.



Fixes

Solution

Although this is an end-of-life product, Commend has created new firmware version WS-CM 2.0 https://clibrary-online.commend.com/   to address the first two issues. The new firmware can be loaded via the program "IP Station Config". To install the firmware, follow the instructions below: * Log in to the Commend web-portal. * Download and extract the "Terminals Software Package". * In "IP Station Config", select the stations to be updated in the table. * Go to: Menu Station > Firmware Download * Select the file "WS-CM 2.0.geh" from the folder "WS-CM" and click on the button Open. For additional information, please visit CSA-2024-42 on Commend's cybersecurity website. https://clibrary-online.commend.com/en/cyber-security/security-advisories.html


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-12T20:25:25.781Z

Reserved: 2024-01-30T22:06:32.537Z

Link: CVE-2024-21767

cve-icon Vulnrichment

Updated: 2024-08-01T22:27:36.216Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-01T21:15:07.973

Modified: 2024-11-21T08:54:58.270

Link: CVE-2024-21767

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.