Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-49461 | An attacker with no knowledge of the current users in the web application, could build a dictionary of potential users and check the server responses as it indicates whether or not the user is present in CIRCUTOR Q-SMT in its firmware version 1.0.4. |
Solution
CIRCUTOR Q-SMT, in its firmware version 1.0.5, effectively solved the potential threat. CIRCUTOR made the new version available to its customers privately and strongly recommends them to keep their equipment updated.
Workaround
No workaround given by the vendor.
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Thu, 26 Sep 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Circutor q-smt
Circutor q-smt Firmware |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:h:circutor:q-smt:-:*:*:*:*:*:*:* cpe:2.3:o:circutor:q-smt_firmware:1.0.4:*:*:*:*:*:*:* |
|
Vendors & Products |
Circutor q-smt
Circutor q-smt Firmware |
Wed, 18 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Circutor
Circutor circutor Q Smt |
|
CPEs | cpe:2.3:a:circutor:circutor_q_smt:*:*:*:*:*:*:*:* | |
Vendors & Products |
Circutor
Circutor circutor Q Smt |
|
Metrics |
ssvc
|
Wed, 18 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An attacker with no knowledge of the current users in the web application, could build a dictionary of potential users and check the server responses as it indicates whether or not the user is present in CIRCUTOR Q-SMT in its firmware version 1.0.4. | |
Title | Exposure of Private Personal Information to an Unauthorized Actor vulnerability on CIRCUTOR Q-SMT | |
Weaknesses | CWE-359 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-09-18T15:28:30.964Z
Reserved: 2024-09-16T10:20:32.471Z
Link: CVE-2024-8891

Updated: 2024-09-18T15:28:25.261Z

Status : Analyzed
Published: 2024-09-18T14:15:20.187
Modified: 2024-09-26T18:50:56.827
Link: CVE-2024-8891

No data.

No data.