Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
It is important to note that the web interface is only available on a physically separate management port and these vulnerabilities have no impact on the timing service ports. For added security, users have the option to disable the web interface, further protecting the device from potential web-based exploitations.
Fri, 29 Aug 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-613 |
Thu, 17 Oct 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microchip timeprovider 4100
|
|
CPEs | cpe:2.3:h:microchip:timeprovider_4100:-:*:*:*:*:*:*:* | |
Vendors & Products |
Microchip timeprovider 4100
|
|
Metrics |
cvssV3_1
|
Mon, 07 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microchip
Microchip timeprovider 4100 Firmware |
|
CPEs | cpe:2.3:o:microchip:timeprovider_4100_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Microchip
Microchip timeprovider 4100 Firmware |
|
Metrics |
ssvc
|
Fri, 04 Oct 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper Authentication vulnerability in Microchip TimeProvider 4100 (login modules) allows Session Hijacking.This issue affects TimeProvider 4100: from 1.0 before 2.4.7. | |
Title | Session token fixation in TimeProvider 4100 | |
Weaknesses | CWE-287 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Microchip
Published:
Updated: 2025-08-29T20:21:47.659Z
Reserved: 2024-08-14T15:39:44.265Z
Link: CVE-2024-43685

Updated: 2024-10-04T21:28:30.623Z

Status : Modified
Published: 2024-10-04T20:15:06.830
Modified: 2025-08-29T21:15:34.760
Link: CVE-2024-43685

No data.

No data.