Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 10 Sep 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Fujitsu
Fujitsu network Edgiot Gw1500
Fujitsu network Edgiot Gw1500 Firmware
Weaknesses CWE-22
CPEs cpe:2.3:h:fujitsu:network_edgiot_gw1500:-:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:network_edgiot_gw1500_firmware:*:*:*:*:*:*:*:*
Vendors & Products Fujitsu
Fujitsu network Edgiot Gw1500
Fujitsu network Edgiot Gw1500 Firmware
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2024-10-29T20:04:48.758Z

Reserved: 2024-07-08T00:59:01.182Z

Link: CVE-2024-40617

cve-icon Vulnrichment

Updated: 2024-08-02T04:33:12.034Z

cve-icon NVD

Status : Modified

Published: 2024-07-17T09:15:03.163

Modified: 2024-11-21T09:31:22.627

Link: CVE-2024-40617

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.