Advantech ADAM-5630
has built-in commands that can be executed without authenticating the
user. These commands allow for restarting the operating system,
rebooting the hardware, and stopping the execution. The commands can be
sent to a simple HTTP request and are executed by the device
automatically, without discrimination of origin or level of privileges
of the user sending the commands.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 27 Sep 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Advantech ADAM-5630 has built-in commands that can be executed without authenticating the user. These commands allow for restarting the operating system, rebooting the hardware, and stopping the execution. The commands can be sent to a simple HTTP request and are executed by the device automatically, without discrimination of origin or level of privileges of the user sending the commands. | |
Title | Advantech ADAM-5630 Missing Authentication for Critical Function | |
Weaknesses | CWE-306 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2024-09-27T17:48:22.902Z
Updated: 2024-09-27T18:13:38.784Z
Reserved: 2024-06-26T15:26:29.573Z
Link: CVE-2024-39364
Vulnrichment
Updated: 2024-09-27T18:13:05.878Z
NVD
Status : Awaiting Analysis
Published: 2024-09-27T18:15:05.417
Modified: 2024-09-30T12:45:57.823
Link: CVE-2024-39364
Redhat
No data.