A remote attacker may be able to bypass access control of Commend WS203VICM by creating a malicious request.
Metrics
Affected Vendors & Products
Solution
Although this is an end-of-life product, Commend has created new firmware version WS-CM 2.0 https://clibrary-online.commend.com/ to address the first two issues. The new firmware can be loaded via the program "IP Station Config". To install the firmware, follow the instructions below: * Log in to the Commend web-portal. * Download and extract the "Terminals Software Package". * In "IP Station Config", select the stations to be updated in the table. * Go to: Menu Station > Firmware Download * Select the file "WS-CM 2.0.geh" from the folder "WS-CM" and click on the button Open. For additional information, please visit CSA-2024-42 on Commend's cybersecurity website. https://clibrary-online.commend.com/en/cyber-security/security-advisories.html
Workaround
No workaround given by the vendor.
No history.

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-12T20:25:25.781Z
Reserved: 2024-01-30T22:06:32.537Z
Link: CVE-2024-21767

Updated: 2024-08-01T22:27:36.216Z

Status : Awaiting Analysis
Published: 2024-03-01T21:15:07.973
Modified: 2024-11-21T08:54:58.270
Link: CVE-2024-21767

No data.

No data.