to the web server of the Commend WS203VICM causing the system to
restart, interrupting service.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19778 | A remote, unauthenticated attacker may be able to send crafted messages to the web server of the Commend WS203VICM causing the system to restart, interrupting service. |
Solution
Although this is an end-of-life product, Commend has created new firmware version WS-CM 2.0 https://clibrary-online.commend.com/ to address the first two issues. The new firmware can be loaded via the program "IP Station Config". To install the firmware, follow the instructions below: * Log in to the Commend web-portal. * Download and extract the "Terminals Software Package". * In "IP Station Config", select the stations to be updated in the table. * Go to: Menu Station > Firmware Download * Select the file "WS-CM 2.0.geh" from the folder "WS-CM" and click on the button Open. For additional information, please visit CSA-2024-42 on Commend's cybersecurity website. https://clibrary-online.commend.com/en/cyber-security/security-advisories.html
Workaround
No workaround given by the vendor.
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-12T20:25:02.479Z
Reserved: 2024-01-30T22:06:32.541Z
Link: CVE-2024-22182
Updated: 2024-08-01T22:35:34.932Z
Status : Awaiting Analysis
Published: 2024-03-01T21:15:08.167
Modified: 2024-11-21T08:55:44.573
Link: CVE-2024-22182
No data.
OpenCVE Enrichment
No data.
EUVD