Vulnerabilites related to idec - kit-fc6a-24-ra
Vulnerability from fkie_nvd
Published
2024-09-04 01:15
Modified
2024-09-19 15:10
Severity ?
Summary
Cleartext transmission of sensitive information vulnerability exists in multiple IDEC PLCs. If an attacker sends a specific command to PLC's serial communication port, user credentials may be obtained. As a result, the program of the PLC may be obtained, and the PLC may be manipulated.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/vu/JVNVU96959731/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://us.idec.com/media/24-RD-0256-EN.pdf | Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-24-kc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C5591819-239C-40EC-AA71-287BB29AEBB6", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-24-kc:-:*:*:*:*:*:*:*", matchCriteriaId: "2519C69F-CBCD-499A-822B-2DCA7FA7411E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-24-pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8B390E0-E868-4200-A398-419589E45525", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-24-pc:-:*:*:*:*:*:*:*", matchCriteriaId: "51EF8595-9323-4049-9EC8-BB7CCECA7C53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-24-ra_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "393B2F7C-29EB-4C42-827E-75C28285066D", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-24-ra:-:*:*:*:*:*:*:*", matchCriteriaId: "D2506B27-5362-4938-ACC3-94AF3A8957D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-24-ra-hg1g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AFA52C42-13C2-4552-9B04-326FDFB88C0B", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-24-ra-hg1g:-:*:*:*:*:*:*:*", matchCriteriaId: "5D2A46ED-1B97-4487-98FB-E6164E137B61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-24-ra-hg2g-5tn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2BF8E45-263C-4454-9C94-5A49B893C2B3", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-24-ra-hg2g-5tn:-:*:*:*:*:*:*:*", matchCriteriaId: "778905B0-444B-492A-8434-FD381A2563B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-24-ra-hg2g-5tt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B727FEF0-A8C9-4030-A7CA-B7D088B76374", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-24-ra-hg2g-5tt:-:*:*:*:*:*:*:*", matchCriteriaId: "CF27ED81-A706-4094-BE6F-601AC3C2299E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-24-rc-hg1g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5EF64248-E833-4084-8544-DCF0E1B2C25F", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-24-rc-hg1g:-:*:*:*:*:*:*:*", matchCriteriaId: "E4832324-A5ED-43C5-BD76-9C92366F5A1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-24-rc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "536DF463-9E0C-4DDE-A418-C2FA36B23595", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-24-rc:-:*:*:*:*:*:*:*", matchCriteriaId: "25DF4C0F-9774-4405-A6CE-AD7874D1D967", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-24-rc-hg2g-5tn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B8478BED-B7BF-4D6F-B559-8ECD24ABDF68", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-24-rc-hg2g-5tn:-:*:*:*:*:*:*:*", matchCriteriaId: "0039449B-4E8D-4C49-81A2-0E60C00C4934", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-24-rc-hg2g-5tt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42110BE3-85E8-4CBA-9463-455CA886ED9B", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-24-rc-hg2g-5tt:-:*:*:*:*:*:*:*", matchCriteriaId: "2973B81D-0530-479F-81D2-1491019246A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-c24r-hg2g-vhp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AAB12A99-B793-40B0-83EC-A1B5AB591B11", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-c24r-hg2g-vhp:-:*:*:*:*:*:*:*", matchCriteriaId: "FD3DE846-8DFF-431E-92E0-68F3840F46AD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-c24r-hg3g-v8hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2FE9949A-1D37-48AB-92D2-8AE0CA940B9D", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-c24r-hg3g-v8hp:-:*:*:*:*:*:*:*", matchCriteriaId: "FBDFB055-5F8C-42D9-A293-DA44DCEFA8A3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-c24r-hg3g-vahp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "49CD5716-8AAD-4FF6-99DA-32CB2162AB8E", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-c24r-hg3g-vahp:-:*:*:*:*:*:*:*", matchCriteriaId: "47E20C8F-EADD-4985-A468-2C30002922AD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-c24r-hg4g-vhp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5B0303EB-2957-4D7A-ACCE-495BD1C15CE9", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-c24r-hg4g-vhp:-:*:*:*:*:*:*:*", matchCriteriaId: "11EB1BEC-267B-4B86-9934-CCF719952324", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-c24r-hg5g-vhp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F90375E5-9CB7-4AE4-9595-9B0DA523D23D", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-c24r-hg5g-vhp:-:*:*:*:*:*:*:*", matchCriteriaId: "AC4ACD71-2DBD-4BC2-AC25-26626BAA3EC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5C4F4E52-38D3-456E-B697-577B621FF313", versionEndIncluding: "2.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-pc:-:*:*:*:*:*:*:*", matchCriteriaId: "BC8C836F-876D-40F0-8CF0-CA790F410B5B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-ra_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D039014E-7F69-4B70-A9A2-997140335636", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-ra:-:*:*:*:*:*:*:*", matchCriteriaId: "2C894A83-E990-4986-95B2-19A0959C9B1B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-kc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9251E5A1-0023-4907-A9F5-D21CC6CA99EB", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-kc:-:*:*:*:*:*:*:*", matchCriteriaId: "74FD009F-7337-418A-BCCD-868F7BF9AA57", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-ra-hg1g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "57CF1294-F942-4438-8E5B-80C160DBB85D", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-ra-hg1g:-:*:*:*:*:*:*:*", matchCriteriaId: "73EFC4AB-E652-4779-BE78-A0D4782CD0DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-ra-hg2g-5tn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "927AF3EF-C32B-4A0B-8C1E-D57F4554B1B1", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-ra-hg2g-5tn:-:*:*:*:*:*:*:*", matchCriteriaId: "465F818B-C957-493D-8BBF-AB16C44A01E6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-ra-hg2g-5tt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C9B64AC0-5CC1-4572-B8A9-313583148708", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-ra-hg2g-5tt:-:*:*:*:*:*:*:*", matchCriteriaId: "171ECFD7-F4BF-4439-86BA-4D00375F0994", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-rc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A4051DC2-0C60-4E92-96BA-5C4618FE598B", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-rc:-:*:*:*:*:*:*:*", matchCriteriaId: "CC0DC0EB-C78D-44A3-964E-5E8D6E44C9A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-rc-hg2g-5tn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CD0B1F0C-3D9B-4C78-AAB9-8A41B2344986", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-rc-hg2g-5tn:-:*:*:*:*:*:*:*", matchCriteriaId: "92F4A9E2-E2C0-4BFD-951F-7227FEE021E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-rc-hg1g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6B7E19B2-28CE-4E90-AC3E-456B79D29794", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-rc-hg1g:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F85331-7082-4D99-B924-F7A40874B7E4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-rc-hg2g-5tt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1AB98499-11E2-453E-9417-D8623E84FD6A", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-rc-hg2g-5tt:-:*:*:*:*:*:*:*", matchCriteriaId: "42674165-3A64-4ABB-8435-CAF9AE29933A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-kd_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "65112070-580F-4F9B-B505-BD1A59DA9351", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-kd:-:*:*:*:*:*:*:*", matchCriteriaId: "8F696DEB-2B0D-46F1-8481-C27D6E6F8438", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-pd_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "95986F89-5016-4156-80F9-99246A2769D0", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-pd:-:*:*:*:*:*:*:*", matchCriteriaId: "FB9F2351-9489-49C3-865A-6DED905703D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-c16r-hg2g-vhp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AB347A48-2081-4385-A5E5-B3AA55B11DF4", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-c16r-hg2g-vhp:-:*:*:*:*:*:*:*", matchCriteriaId: "05A6747E-93F4-4619-BC4D-EE2D7FAA093A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-c16r-hg3g-v8hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "514B9777-8FD0-413A-A2CB-B24A20BF7794", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-c16r-hg3g-v8hp:-:*:*:*:*:*:*:*", matchCriteriaId: "E4A972DA-CBAD-4141-867F-CDD36D0AFF31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-c16r-hg3g-vahp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05062F00-81F4-45AA-A34E-754FABE769FC", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-c16r-hg3g-vahp:-:*:*:*:*:*:*:*", matchCriteriaId: "C6A8DFB5-B9AE-45D8-B259-48BF12853953", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-c16r-hg5g-vhp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F52D1AD7-C7FF-49F0-867D-C800CA35A759", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-c16r-hg5g-vhp:-:*:*:*:*:*:*:*", matchCriteriaId: "5549ACBF-D0D3-4FD2-BB4B-EB82971248FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-c16r-hg5g-vhp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F52D1AD7-C7FF-49F0-867D-C800CA35A759", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-c16r-hg5g-vhp:-:*:*:*:*:*:*:*", matchCriteriaId: "5549ACBF-D0D3-4FD2-BB4B-EB82971248FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-rd_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E272F507-63D8-412E-A56B-8EA3B943E4EF", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-rd:-:*:*:*:*:*:*:*", matchCriteriaId: "2A5013BA-BF99-4728-BF33-08030B3322D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-16-rd_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E272F507-63D8-412E-A56B-8EA3B943E4EF", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-16-rd:-:*:*:*:*:*:*:*", matchCriteriaId: "2A5013BA-BF99-4728-BF33-08030B3322D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-40-kd_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A912AD4A-6F44-49B3-B5BC-532E573B783B", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-40-kd:-:*:*:*:*:*:*:*", matchCriteriaId: "EE6E09EE-FE9D-4BD1-8B02-7A11A519A1B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-40-pc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6916FAF0-78DD-40C0-BA8B-995037AF01F5", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-40-pc:-:*:*:*:*:*:*:*", matchCriteriaId: "FD572A95-1B47-4592-80CA-5572C749BD96", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-40-pd_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C8DA45F7-3B60-4570-AF31-848D083E14E3", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-40-pd:-:*:*:*:*:*:*:*", matchCriteriaId: "5D3E6DA9-46D5-4ED2-A442-112B69320209", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-40-ra_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "811F1405-B33F-4AA4-90ED-425332E86548", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-40-ra:-:*:*:*:*:*:*:*", matchCriteriaId: "A0698390-2E86-4F19-B6B6-3ACFA33FD0DA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-40-rd_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F3EC3FED-A41F-41D8-A50D-F35EEAEBB944", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-40-rd:-:*:*:*:*:*:*:*", matchCriteriaId: "EB9A6521-C87A-42CF-BF14-4CFF8066DF1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-40-rc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "84F73641-D7BD-491B-B000-BE0768571F78", versionEndIncluding: "2.60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-40-rc:-:*:*:*:*:*:*:*", matchCriteriaId: "42931BD1-A53C-4D15-8C71-2D71EAD4ED98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d16p-hg1g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3715E883-6C7E-448E-9013-CD9F843AF016", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d16p-hg1g:-:*:*:*:*:*:*:*", matchCriteriaId: "40B9F3F9-31CA-487C-B731-DB13F80D211A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d16p-hg2g-5tn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "59BB2D09-6A62-434D-B3D4-12A57CB5DC1F", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d16p-hg2g-5tn:-:*:*:*:*:*:*:*", matchCriteriaId: "8947F40B-1506-4D8E-9750-39CDD940F479", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d16p-hg2g-5tt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42D9290F-155C-4E11-8AB1-4D6B5857DF22", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d16p-hg2g-5tt:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA659F9-8C4B-4628-B2C8-E476D7EA43D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d16r-hg2g-5tn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D9D2CAB8-0A0F-438C-B32A-06EA5BECECE7", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d16r-hg2g-5tn:-:*:*:*:*:*:*:*", matchCriteriaId: "3EF5AC88-2BD3-4E26-9E02-BC480717C448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d16r-hg2g-5tt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C493595-910F-4908-8727-01C003E83337", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d16r-hg2g-5tt:-:*:*:*:*:*:*:*", matchCriteriaId: "CA4B242E-BC30-40B5-857A-FBC302E5D191", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d16r-hg3g-v8hp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A4F0C2C3-5CC6-44A5-A8CB-70FC322DA369", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d16r-hg3g-v8hp:-:*:*:*:*:*:*:*", matchCriteriaId: "6A82E112-5AF0-4512-96A3-DE2A05896A2A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d16r-hg3g-vahp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AF4321C8-93F1-42CC-BFD3-60B5B2C8CB00", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d16r-hg3g-vahp:-:*:*:*:*:*:*:*", matchCriteriaId: "F43A176A-AA2E-4182-BB54-502963EE194C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d16r-hg4g-vhp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5594A0F2-FBA8-4FE1-B56B-AFFDA26794B9", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d16r-hg4g-vhp:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6D8A84-52C3-4687-AD0D-33FFE6E07764", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d16r-hg5g-vhp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE5C694C-435E-4710-B6D5-E3A9441D62F5", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d16r-hg5g-vhp:-:*:*:*:*:*:*:*", matchCriteriaId: "B4ACB61B-1D40-4388-BE93-7CFAD75CF765", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d16r-hg1g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "42C7F307-B5AC-4600-88C3-1FDC51BD2A3D", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d16r-hg1g:-:*:*:*:*:*:*:*", matchCriteriaId: "083FC621-B444-474A-8344-7DB3C32320D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d16r-hg2g-vhp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4FCC7EA9-AF43-45A2-BB3D-7509FEC8BFB3", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d16r-hg2g-vhp:-:*:*:*:*:*:*:*", matchCriteriaId: "27E6A7B1-1E3D-4133-95C4-65F4230031DA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-p16-k_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BDD06B86-B260-40FB-8323-839AB11D1BA0", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-p16-k:-:*:*:*:*:*:*:*", matchCriteriaId: "6DE4C5C2-32D0-41B9-BACD-02B8B480D983", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-p16-r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C0C83520-0600-4C29-8E32-712A26A6F8BF", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-p16-r:-:*:*:*:*:*:*:*", matchCriteriaId: "EE8AD540-B55B-49B3-B6BE-72FD672CAF82", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-p16-s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "600E6643-752F-461E-9901-CBD164A0109F", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-p16-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2964052B-CD99-4299-85BD-270854BE80A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:ft1a-h12ra_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8A58080C-7D7C-4A32-B5EC-F7A5B12D5B2D", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:ft1a-h12ra:-:*:*:*:*:*:*:*", matchCriteriaId: "05E43E48-30D2-4721-9AF2-852E606FD990", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:ft1a-h24ra_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AF0A218-CC2B-4138-999C-8A2BAA8B95F1", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:ft1a-h24ra:-:*:*:*:*:*:*:*", matchCriteriaId: "5D25D6F3-A93A-418D-A896-132C11C54ABF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:ft1a-h24rc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "02E100ED-CB88-4ED1-9FE7-C2C5F97F077F", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:ft1a-h24rc:-:*:*:*:*:*:*:*", matchCriteriaId: "6D05FF9C-4838-4BA8-93FE-FEB6FABE4084", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:ft1a-h12rc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "337052CA-AACF-40B7-BB67-D72D1C05C1D5", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:ft1a-h12rc:-:*:*:*:*:*:*:*", matchCriteriaId: "C1E009EB-206C-4B89-ABFC-97C339A3F982", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:ft1a-b12ra_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1032FB1D-E64D-4756-992B-97E4A75213FE", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:ft1a-b12ra:-:*:*:*:*:*:*:*", matchCriteriaId: "BB778A9F-4A9A-4D32-AF91-29E6BF01CE37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:ft1a-b24ra_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C7009CEF-8515-4D0D-9469-C5175EC4E730", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:ft1a-b24ra:-:*:*:*:*:*:*:*", matchCriteriaId: "A2E7090E-81E4-42F1-B9C4-D23CA3A61D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-12-bac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "29731477-84A0-40B7-905B-26D66286DC8A", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-12-bac:-:*:*:*:*:*:*:*", matchCriteriaId: "814A2490-ED4F-48B7-AB4B-94CD8515B333", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-12-hac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C781F354-2908-4CA8-AEB6-DB27D77ECB57", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-12-hac:-:*:*:*:*:*:*:*", matchCriteriaId: "D6B15ED2-AB2B-4A49-992C-E8DAA620C989", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-12-bdc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7E793E94-D411-4F46-A2D2-2D9CD079BEAA", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-12-bdc:-:*:*:*:*:*:*:*", matchCriteriaId: "F04E0C7F-8B77-466F-AA11-D7FF2B857996", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-12-hdc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6191E6D6-35DC-4DCB-9681-1431F70DB416", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-12-hdc:-:*:*:*:*:*:*:*", matchCriteriaId: "6A2B9CAB-BD62-48B8-A0ED-F3ADC400FF05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-24-hac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA39B3FF-0497-4A2E-B39C-DB6F96039682", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-24-hac:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDEFAC7-5705-4892-A0F0-A9409D637129", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-24-bac_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E75060D-BEFB-43B8-95DD-1BC39C4E072E", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-24-bac:-:*:*:*:*:*:*:*", matchCriteriaId: "FE7F4B16-63AC-4C9B-B5B0-1EC7C691C59A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-24-bdc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2DEA3C76-C290-4935-96D1-90905E2FB7F2", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-24-bdc:-:*:*:*:*:*:*:*", matchCriteriaId: "9C01E3DE-CC72-4974-A207-6611B1D8B183", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-24-hdc_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "19D55D03-D3F3-4F2A-84D1-9BB358176188", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-24-hdc:-:*:*:*:*:*:*:*", matchCriteriaId: "CB5BADFB-11C8-4395-A507-65CEA8297483", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-40-bac-r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A4649782-34A4-4190-B4B5-63823EA7EB5A", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-40-bac-r:-:*:*:*:*:*:*:*", matchCriteriaId: "DE34F122-20C4-4A20-8F0D-9095EFC77836", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-40-bdc-rk_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FD2D5E18-A2B0-4E12-B80B-967841DC3FA1", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-40-bdc-rk:-:*:*:*:*:*:*:*", matchCriteriaId: "49243944-969C-46DF-B0E1-9981F1BDD591", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-40-bdc-rs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A6F55920-D9D7-43E9-8937-946908543F7B", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-40-bdc-rs:-:*:*:*:*:*:*:*", matchCriteriaId: "3C0C71A9-99C6-4077-BA69-0775F8760744", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-40-hac-r_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D075D7DD-1B5B-41C7-BDE9-D2D943944D73", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-40-hac-r:-:*:*:*:*:*:*:*", matchCriteriaId: "1ABC5140-2624-4349-A430-0DCE42E1C31F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-40-hdc-rk_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87FE8EE5-D7DB-4544-A4C7-6A5C5921AFB5", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-40-hdc-rk:-:*:*:*:*:*:*:*", matchCriteriaId: "A225EC25-F68E-4C02-92CE-1D1B223EF4ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-48-bac-k_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "77AF90A5-6040-43A7-A04C-02BAD2AFF516", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-48-bac-k:-:*:*:*:*:*:*:*", matchCriteriaId: "725D65CF-FFD9-4C97-95FB-9FFE4DA7292F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-40-hdc-rs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1170E1B-41A5-4B5C-9266-B2FAAD643B0C", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-40-hdc-rs:-:*:*:*:*:*:*:*", matchCriteriaId: "CFA3E11F-7F85-4403-BBBF-1814F0D28A34", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-48-bac-s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5CD74126-7918-47BD-BF46-172EC3F63747", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-48-bac-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BD2C8B00-7C46-4FB6-9F17-4E38C1BA4539", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-48-bdc-k_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D1D7F1C4-69FD-438D-9F29-C8410B1F265C", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-48-bdc-k:-:*:*:*:*:*:*:*", matchCriteriaId: "857E7778-8415-408E-B88E-56DAF162C824", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-48-hac-k_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "775DF4C7-EE1B-49E3-A9FA-A9FC2D289293", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-48-hac-k:-:*:*:*:*:*:*:*", matchCriteriaId: "FDC22C55-846F-4041-8D2F-61196EF372FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-48-hac-s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03090AE2-2571-4190-8445-85E5D4BC5C56", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-48-hac-s:-:*:*:*:*:*:*:*", matchCriteriaId: "11672168-5733-47F3-B948-0DFFCBBF3473", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-48-hac-k_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "775DF4C7-EE1B-49E3-A9FA-A9FC2D289293", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-48-hac-k:-:*:*:*:*:*:*:*", matchCriteriaId: "FDC22C55-846F-4041-8D2F-61196EF372FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-48-hdc-s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "271848FB-16E8-4624-AAAF-359AFC7C61A4", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-48-hdc-s:-:*:*:*:*:*:*:*", matchCriteriaId: "E319607D-93D1-46B1-8FFB-5FF025F24FCA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-smart-48-bdc-s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "09CFB949-DCB1-4F0F-8E70-617F21F8C76B", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-smart-48-bdc-s:-:*:*:*:*:*:*:*", matchCriteriaId: "8DCB2F29-AC93-42D0-8E96-23A499F52B7E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:ft1a-pc1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39757AB6-1C7B-4D8F-A967-21AD0B217276", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:ft1a-pc1:-:*:*:*:*:*:*:*", matchCriteriaId: "7765A7E7-CAB9-47A6-80EE-85C8F644ED0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:ft1a-pc2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9310BD27-FCC3-4E6C-8820-AAEC3B2B3F04", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:ft1a-pc2:-:*:*:*:*:*:*:*", matchCriteriaId: "62CE33D5-6165-4ACD-98EA-0AF383C368BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:ft1a-pc3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DF3629D5-B20E-43E3-9D61-7EE204720296", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:ft1a-pc3:-:*:*:*:*:*:*:*", matchCriteriaId: "7CE609B6-B337-4C90-9B69-C14B4DDCB9B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:ft1a-pm1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0CFF5CCA-CF62-436E-91F6-1221CE09BE9F", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:ft1a-pm1:-:*:*:*:*:*:*:*", matchCriteriaId: "533F200D-12B4-469D-B0C2-0CB4662A5B95", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:ft9z-1a01_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "893252A2-E885-43C0-9C20-E8B9CC22539C", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:ft9z-1a01:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD744D6-1765-4B46-A8EF-2665E084C905", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:ft9z-psp1pn05_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "78A6DE64-1D61-43E4-85BE-D12093B6CCA3", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:ft9z-psp1pn05:-:*:*:*:*:*:*:*", matchCriteriaId: "0B8C7825-E7EC-4389-B34E-1EEE6BA87DDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:hg9z-xcm2a_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7865E0D0-1164-4FE1-B979-5433EF61A5BF", versionEndIncluding: "2.41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:hg9z-xcm2a:-:*:*:*:*:*:*:*", matchCriteriaId: "E37C15A3-67C9-470F-9EBA-9177CA755092", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d32p-hg1g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C191287-9F15-4FCB-A6F0-F49AC213889C", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d32p-hg1g:-:*:*:*:*:*:*:*", matchCriteriaId: "A3ACF8A3-5836-4901-90E7-71C7B1B56FAF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d32p-hg2g-5tn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "25FB0D4B-3CC9-4916-9C53-E717BA569A43", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d32p-hg2g-5tn:-:*:*:*:*:*:*:*", matchCriteriaId: "5B865828-82F6-47A6-B78F-38E6B105F088", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-d32p-hg2g-5tt_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5B07EDF2-35F3-40CB-B2A1-554EFD5B3DFE", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-d32p-hg2g-5tt:-:*:*:*:*:*:*:*", matchCriteriaId: "9C4B4261-B80F-4177-BDDC-18EB196AFFCB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-p32-k_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7B354E58-9F30-4BB9-9027-D9050EFE3062", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-p32-k:-:*:*:*:*:*:*:*", matchCriteriaId: "76EF08C3-A02E-4939-A088-4F3E1E5D5AA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:idec:kit-fc6a-p32-s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40FEFB26-7FBB-453B-AB19-47915394338E", versionEndIncluding: "2.40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:idec:kit-fc6a-p32-s:-:*:*:*:*:*:*:*", matchCriteriaId: "72D65E62-F6E5-4885-87F0-28CDFFB1352E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cleartext transmission of sensitive information vulnerability exists in multiple IDEC PLCs. If an attacker sends a specific command to PLC's serial communication port, user credentials may be obtained. As a result, the program of the PLC may be obtained, and the PLC may be manipulated.", }, { lang: "es", value: "Existe una vulnerabilidad de transmisión de información confidencial en texto plano en varios PLC de IDEC. Si un atacante envía un comando específico al puerto de comunicación en serie del PLC, se pueden obtener las credenciales del usuario. Como resultado, se puede obtener el programa del PLC y manipularlo.", }, ], id: "CVE-2024-41927", lastModified: "2024-09-19T15:10:57.793", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "NONE", baseScore: 4.6, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 0.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-09-04T01:15:11.827", references: [ { source: "vultures@jpcert.or.jp", tags: [ "Third Party Advisory", ], url: "https://jvn.jp/en/vu/JVNVU96959731/", }, { source: "vultures@jpcert.or.jp", tags: [ "Vendor Advisory", ], url: "https://us.idec.com/media/24-RD-0256-EN.pdf", }, ], sourceIdentifier: "vultures@jpcert.or.jp", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-319", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2024-41927
Vulnerability from cvelistv5
Published
2024-09-04 00:43
Modified
2024-09-04 13:59
Severity ?
EPSS score ?
Summary
Cleartext transmission of sensitive information vulnerability exists in multiple IDEC PLCs. If an attacker sends a specific command to PLC's serial communication port, user credentials may be obtained. As a result, the program of the PLC may be obtained, and the PLC may be manipulated.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | IDEC Corporation | FC6A Series MICROSmart All-in-One CPU module |
Version: Ver.2.60 and earlier |
||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-41927", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-09-04T13:59:49.820372Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-09-04T13:59:57.911Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "FC6A Series MICROSmart All-in-One CPU module", vendor: "IDEC Corporation", versions: [ { status: "affected", version: "Ver.2.60 and earlier", }, ], }, { product: "FC6B Series MICROSmart All-in-One CPU module", vendor: "IDEC Corporation", versions: [ { status: "affected", version: "Ver.2.60 and earlier", }, ], }, { product: "FC6A Series MICROSmart Plus CPU module", vendor: "IDEC Corporation", versions: [ { status: "affected", version: "Ver.2.40 and earlier", }, ], }, { product: "FC6B Series MICROSmart Plus CPU module", vendor: "IDEC Corporation", versions: [ { status: "affected", version: "Ver.2.60 and earlier", }, ], }, { product: "FT1A Series SmartAXIS Pro/Lite", vendor: "IDEC Corporation", versions: [ { status: "affected", version: "Ver.2.41 and earlier", }, ], }, ], descriptions: [ { lang: "en", value: "Cleartext transmission of sensitive information vulnerability exists in multiple IDEC PLCs. If an attacker sends a specific command to PLC's serial communication port, user credentials may be obtained. As a result, the program of the PLC may be obtained, and the PLC may be manipulated.", }, ], problemTypes: [ { descriptions: [ { description: "Cleartext transmission of sensitive information", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-04T00:43:55.555Z", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { url: "https://us.idec.com/media/24-RD-0256-EN.pdf", }, { url: "https://jvn.jp/en/vu/JVNVU96959731/", }, ], }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2024-41927", datePublished: "2024-09-04T00:43:55.555Z", dateReserved: "2024-08-01T01:18:07.241Z", dateUpdated: "2024-09-04T13:59:57.911Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }