A remote, unauthenticated attacker may be able to send crafted messages
to the web server of the Commend WS203VICM causing the system to
restart, interrupting service.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-19778 A remote, unauthenticated attacker may be able to send crafted messages to the web server of the Commend WS203VICM causing the system to restart, interrupting service.
Fixes

Solution

Although this is an end-of-life product, Commend has created new firmware version WS-CM 2.0 https://clibrary-online.commend.com/   to address the first two issues. The new firmware can be loaded via the program "IP Station Config". To install the firmware, follow the instructions below: * Log in to the Commend web-portal. * Download and extract the "Terminals Software Package". * In "IP Station Config", select the stations to be updated in the table. * Go to: Menu Station > Firmware Download * Select the file "WS-CM 2.0.geh" from the folder "WS-CM" and click on the button Open. For additional information, please visit CSA-2024-42 on Commend's cybersecurity website. https://clibrary-online.commend.com/en/cyber-security/security-advisories.html


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-12T20:25:02.479Z

Reserved: 2024-01-30T22:06:32.541Z

Link: CVE-2024-22182

cve-icon Vulnrichment

Updated: 2024-08-01T22:35:34.932Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-01T21:15:08.167

Modified: 2024-11-21T08:55:44.573

Link: CVE-2024-22182

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.