Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2024-28957 CVE-2024-41927 |
CWE-ID | CWE-340 CWE-319 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
FC6B Series MICROSmart Plus CPU module Hardware solutions / Firmware FC6A Series MICROSmart Plus CPU module Hardware solutions / Firmware FC6B Series MICROSmart All-in-One CPU module Hardware solutions / Firmware FC6A Series MICROSmart All-in-One CPU module Hardware solutions / Firmware FT1A Series SmartAXIS Pro/Lite Hardware solutions / Firmware |
Vendor | IDEC Corporation |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU88179
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-28957
CWE-ID:
CWE-340 - Generation of Predictable Numbers or Identifiers
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to generation of predictable numbers or identifiers. A remote attacker can predict some packet header IDs of the device and interfere communications.
MitigationInstall update from vendor's website.
Vulnerable software versionsFC6B Series MICROSmart Plus CPU module: 2.60
FC6A Series MICROSmart Plus CPU module: 2.40
FC6B Series MICROSmart All-in-One CPU module: 2.60
FC6A Series MICROSmart All-in-One CPU module: 2.60
CPE2.3http://jvn.jp/en/vu/JVNVU96959731/index.html
http://us.idec.com/media/24-RD-0256-EN.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96629
Risk: Low
CVSSv3.1: 4 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-41927
CWE-ID:
CWE-319 - Cleartext Transmission of Sensitive Information
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain access to sensitive information.
The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. An attacker with physical access can gain access to sensitive data.
MitigationInstall update from vendor's website.
Vulnerable software versionsFT1A Series SmartAXIS Pro/Lite: 2.41
FC6B Series MICROSmart Plus CPU module: 2.60
FC6A Series MICROSmart Plus CPU module: 2.40
FC6B Series MICROSmart All-in-One CPU module: 2.60
FC6A Series MICROSmart All-in-One CPU module: 2.60
CPE2.3http://jvn.jp/en/vu/JVNVU96959731/index.html
http://us.idec.com/media/24-RD-0256-EN.pdf
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.