Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
It is important to note that the web interface is only available on a physically separate management port and these vulnerabilities have no impact on the timing service ports. For added security, users have the option to disable the web interface, further protecting the device from potential web-based exploitations.
Fri, 29 Aug 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-79 |
Fri, 01 Nov 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 01 Nov 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 17 Oct 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microchip timeprovider 4100
|
|
CPEs | cpe:2.3:h:microchip:timeprovider_4100:-:*:*:*:*:*:*:* | |
Vendors & Products |
Microchip timeprovider 4100
|
|
Metrics |
cvssV3_1
|
Mon, 07 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microchip
Microchip timeprovider 4100 Firmware |
|
CPEs | cpe:2.3:o:microchip:timeprovider_4100_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Microchip
Microchip timeprovider 4100 Firmware |
|
Metrics |
ssvc
|
Fri, 04 Oct 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Cross-Site Request Forgery (CSRF) vulnerability in Microchip TimeProvider 4100 allows Cross Site Request Forgery, Cross-Site Scripting (XSS).This issue affects TimeProvider 4100: from 1.0. | |
Title | Cross-Site Request Forgery vulnerability in TimeProvider 4100 | |
Weaknesses | CWE-352 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Microchip
Published:
Updated: 2025-08-29T20:11:56.019Z
Reserved: 2024-08-14T15:39:44.265Z
Link: CVE-2024-43684

Updated: 2024-10-04T21:28:24.330Z

Status : Modified
Published: 2024-10-04T20:15:06.710
Modified: 2025-08-29T21:15:34.493
Link: CVE-2024-43684

No data.

No data.