Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Sep 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fujitsu
Fujitsu network Edgiot Gw1500 Fujitsu network Edgiot Gw1500 Firmware |
|
Weaknesses | CWE-22 | |
CPEs | cpe:2.3:h:fujitsu:network_edgiot_gw1500:-:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:network_edgiot_gw1500_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Fujitsu
Fujitsu network Edgiot Gw1500 Fujitsu network Edgiot Gw1500 Firmware |
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: jpcert
Published: 2024-07-17T08:44:44.939Z
Updated: 2024-10-29T20:04:48.758Z
Reserved: 2024-07-08T00:59:01.182Z
Link: CVE-2024-40617
Vulnrichment
Updated: 2024-08-02T04:33:12.034Z
NVD
Status : Modified
Published: 2024-07-17T09:15:03.163
Modified: 2024-11-21T09:31:22.627
Link: CVE-2024-40617
Redhat
No data.