has built-in commands that can be executed without authenticating the
user. These commands allow for restarting the operating system,
rebooting the hardware, and stopping the execution. The commands can be
sent to a simple HTTP request and are executed by the device
automatically, without discrimination of origin or level of privileges
of the user sending the commands.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-37920 | Advantech ADAM-5630 has built-in commands that can be executed without authenticating the user. These commands allow for restarting the operating system, rebooting the hardware, and stopping the execution. The commands can be sent to a simple HTTP request and are executed by the device automatically, without discrimination of origin or level of privileges of the user sending the commands. |
Solution
Advantech recommends users upgrade their ADAM-5630 devices to version 2.5.2 https://www.advantech.com/zh-tw/support/details/firmware .
Workaround
No workaround given by the vendor.
Fri, 27 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Sep 2024 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Advantech ADAM-5630 has built-in commands that can be executed without authenticating the user. These commands allow for restarting the operating system, rebooting the hardware, and stopping the execution. The commands can be sent to a simple HTTP request and are executed by the device automatically, without discrimination of origin or level of privileges of the user sending the commands. | |
| Title | Advantech ADAM-5630 Missing Authentication for Critical Function | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-27T18:13:38.784Z
Reserved: 2024-06-26T15:26:29.573Z
Link: CVE-2024-39364
Updated: 2024-09-27T18:13:05.878Z
Status : Awaiting Analysis
Published: 2024-09-27T18:15:05.417
Modified: 2024-09-30T12:45:57.823
Link: CVE-2024-39364
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:23:07Z
EUVD