Description
A remote, unauthenticated attacker may be able to send crafted messages
to the web server of the Commend WS203VICM causing the system to
restart, interrupting service.

Published: 2024-03-01
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Although this is an end-of-life product, Commend has created new firmware version WS-CM 2.0 https://clibrary-online.commend.com/   to address the first two issues. The new firmware can be loaded via the program "IP Station Config". To install the firmware, follow the instructions below: * Log in to the Commend web-portal. * Download and extract the "Terminals Software Package". * In "IP Station Config", select the stations to be updated in the table. * Go to: Menu Station > Firmware Download * Select the file "WS-CM 2.0.geh" from the folder "WS-CM" and click on the button Open. For additional information, please visit CSA-2024-42 on Commend's cybersecurity website. https://clibrary-online.commend.com/en/cyber-security/security-advisories.html

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-19778 A remote, unauthenticated attacker may be able to send crafted messages to the web server of the Commend WS203VICM causing the system to restart, interrupting service.
History

No history.

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-12T20:25:02.479Z

Reserved: 2024-01-30T22:06:32.541Z

Link: CVE-2024-22182

cve-icon Vulnrichment

Updated: 2024-08-01T22:35:34.932Z

cve-icon NVD

Status : Deferred

Published: 2024-03-01T21:15:08.167

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-22182

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses