Vulnerabilites related to mitsubishielectric - sw1dnc-qsccf-b_firmware
Vulnerability from fkie_nvd
Published
2024-07-02 16:15
Modified
2024-11-21 09:00
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper privilege management in Jungo WinDriver before 12.2.0 allows local attackers to escalate privileges and execute arbitrary code.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jungo.com/windriver/versions/ | Release Notes | |
cve@mitre.org | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jungo.com/windriver/versions/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", matchCriteriaId: "0B7C4DE4-D93B-4AA6-B98E-738E00DC5024", versionEndExcluding: "12.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "463EA623-0DC2-4287-A9AC-837CBDECF76C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "E798352C-E09B-4D18-B3A8-CFCDE0AD3675", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "21CC610A-0561-46A1-9077-D01D5C3F1A8F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", matchCriteriaId: "8B36ABBC-DB27-44D1-B844-00DFC3BBF043", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", matchCriteriaId: "C6E4BC24-6583-4791-9ED9-D2D675187DCD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", matchCriteriaId: "D236ABC2-93E4-4428-B949-7E17945E4D98", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "CED78B28-BBBF-4869-BC1C-F0789867FB4C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", matchCriteriaId: "0C79890F-0B41-4855-84EE-78D5896C87A1", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", matchCriteriaId: "4400D339-BB12-414A-B891-B6105D7FCA39", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", matchCriteriaId: "6871A74E-8B92-4892-970F-757F404590CB", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", matchCriteriaId: "03DE7DE4-DC4B-40F3-BB22-B8E524081942", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", matchCriteriaId: "9F8037F0-C124-4EFB-AEA1-89441975D36F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", matchCriteriaId: "9C37E74B-DA76-4E59-953E-C50D0D75804A", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", matchCriteriaId: "B0B195E2-6076-487C-899F-A40B886BA556", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", matchCriteriaId: "6C4E7C31-D08D-487F-B7FF-9502783FFDB9", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", matchCriteriaId: "F4AEDEEE-5070-41E2-B4DC-6DE8456BC028", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", matchCriteriaId: "7097AFD0-5A8C-4C62-AAF7-16FB71DE210C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "A661B972-912C-4DAA-9518-CC01E0EB1A81", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "76C1D9F0-48A8-4193-A781-B19ACE1B0B4B", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "9FB81A97-4BE8-4570-914F-304F38968613", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", matchCriteriaId: "CE14782A-4AD2-4633-8A3A-D81D5C434046", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", matchCriteriaId: "4A1BABCB-EDD7-4B1D-AE49-77DD1A3CCB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", matchCriteriaId: "4F89B350-B20F-45A8-8809-E9776C319591", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "2B10E09F-84F3-42E3-9B8D-DE309ED4A4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", matchCriteriaId: "7C12A1AA-66F0-452F-9B75-562F4A979CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", matchCriteriaId: "33A13944-145E-453E-A409-BE4A984619AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A10A8E35-923F-483B-A924-441B78FFCF6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", matchCriteriaId: "938DDBFF-A0CC-4311-9F30-08ABDBB67742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB49716D-8E0B-4E4C-B206-104BB64F6301", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8B0237-9A91-4954-AFBE-E661467D842A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B3B0B5A-27F2-4E08-8B75-1EAAC4DC840D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0B80AF0C-EFED-4CA0-B990-0ADA6F1D0AEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B4348FF-8691-4832-9103-F46282924299", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", matchCriteriaId: "07737420-567D-49CC-9A9E-555038DFF0AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3A5D57-DB2C-429F-BB3F-8EB7F4767E1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", matchCriteriaId: "FD4CA442-BC30-407E-851E-E03037E75E8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9826969F-D449-4032-8A0B-050D7CC3B1AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", matchCriteriaId: "858F9CAA-E6D3-4F1D-923D-ED9E05C3AC54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61A13AD1-22F7-4FFD-BCB7-A4FDAF2BA659", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", matchCriteriaId: "009853DA-ACAE-4928-AE90-090A3739BD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "476C7885-89D2-4A6C-94FE-E06B55A23E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF10CF6-1C1D-4768-A349-1AEFD26F491A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper privilege management in Jungo WinDriver before 12.2.0 allows local attackers to escalate privileges and execute arbitrary code.", }, { lang: "es", value: "La gestión inadecuada de privilegios en Jungo WinDriver anterior a 12.2.0 permite a atacantes locales escalar privilegios y ejecutar código arbitrario.", }, ], id: "CVE-2024-25086", lastModified: "2024-11-21T09:00:13.183", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-07-02T16:15:04.070", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-94", }, { lang: "en", value: "CWE-269", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-07-02 16:15
Modified
2024-11-21 09:00
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper privilege management in Jungo WinDriver before 12.5.1 allows local attackers to escalate privileges and execute arbitrary code.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jungo.com/windriver/versions/ | Release Notes | |
cve@mitre.org | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jungo.com/windriver/versions/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", matchCriteriaId: "CD5769FE-170B-4FCC-9A2E-B487C2DAFB16", versionEndExcluding: "12.5.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "463EA623-0DC2-4287-A9AC-837CBDECF76C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "E798352C-E09B-4D18-B3A8-CFCDE0AD3675", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "21CC610A-0561-46A1-9077-D01D5C3F1A8F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", matchCriteriaId: "8B36ABBC-DB27-44D1-B844-00DFC3BBF043", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", matchCriteriaId: "C6E4BC24-6583-4791-9ED9-D2D675187DCD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", matchCriteriaId: "D236ABC2-93E4-4428-B949-7E17945E4D98", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "CED78B28-BBBF-4869-BC1C-F0789867FB4C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", matchCriteriaId: "0C79890F-0B41-4855-84EE-78D5896C87A1", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", matchCriteriaId: "4400D339-BB12-414A-B891-B6105D7FCA39", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", matchCriteriaId: "6871A74E-8B92-4892-970F-757F404590CB", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", matchCriteriaId: "03DE7DE4-DC4B-40F3-BB22-B8E524081942", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", matchCriteriaId: "9F8037F0-C124-4EFB-AEA1-89441975D36F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", matchCriteriaId: "9C37E74B-DA76-4E59-953E-C50D0D75804A", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", matchCriteriaId: "B0B195E2-6076-487C-899F-A40B886BA556", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", matchCriteriaId: "6C4E7C31-D08D-487F-B7FF-9502783FFDB9", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", matchCriteriaId: "F4AEDEEE-5070-41E2-B4DC-6DE8456BC028", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", matchCriteriaId: "7097AFD0-5A8C-4C62-AAF7-16FB71DE210C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "A661B972-912C-4DAA-9518-CC01E0EB1A81", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "76C1D9F0-48A8-4193-A781-B19ACE1B0B4B", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "9FB81A97-4BE8-4570-914F-304F38968613", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", matchCriteriaId: "CE14782A-4AD2-4633-8A3A-D81D5C434046", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", matchCriteriaId: "4A1BABCB-EDD7-4B1D-AE49-77DD1A3CCB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", matchCriteriaId: "4F89B350-B20F-45A8-8809-E9776C319591", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "2B10E09F-84F3-42E3-9B8D-DE309ED4A4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", matchCriteriaId: "7C12A1AA-66F0-452F-9B75-562F4A979CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", matchCriteriaId: "33A13944-145E-453E-A409-BE4A984619AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A10A8E35-923F-483B-A924-441B78FFCF6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", matchCriteriaId: "938DDBFF-A0CC-4311-9F30-08ABDBB67742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB49716D-8E0B-4E4C-B206-104BB64F6301", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8B0237-9A91-4954-AFBE-E661467D842A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B3B0B5A-27F2-4E08-8B75-1EAAC4DC840D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0B80AF0C-EFED-4CA0-B990-0ADA6F1D0AEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B4348FF-8691-4832-9103-F46282924299", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", matchCriteriaId: "07737420-567D-49CC-9A9E-555038DFF0AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3A5D57-DB2C-429F-BB3F-8EB7F4767E1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", matchCriteriaId: "FD4CA442-BC30-407E-851E-E03037E75E8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9826969F-D449-4032-8A0B-050D7CC3B1AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", matchCriteriaId: "858F9CAA-E6D3-4F1D-923D-ED9E05C3AC54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61A13AD1-22F7-4FFD-BCB7-A4FDAF2BA659", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", matchCriteriaId: "009853DA-ACAE-4928-AE90-090A3739BD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "476C7885-89D2-4A6C-94FE-E06B55A23E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF10CF6-1C1D-4768-A349-1AEFD26F491A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper privilege management in Jungo WinDriver before 12.5.1 allows local attackers to escalate privileges and execute arbitrary code.", }, { lang: "es", value: "La gestión inadecuada de privilegios en Jungo WinDriver anterior a 12.5.1 permite a atacantes locales escalar privilegios y ejecutar código arbitrario.", }, ], id: "CVE-2024-25088", lastModified: "2024-11-21T09:00:13.633", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-07-02T16:15:04.250", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-269", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-07-02 16:15
Modified
2024-11-21 09:02
Severity ?
Summary
Improper privilege management in Jungo WinDriver 6.0.0 through 16.1.0 allows local attackers to escalate privileges and execute arbitrary code.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jungo.com/windriver/versions/ | Release Notes | |
cve@mitre.org | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jungo.com/windriver/versions/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", matchCriteriaId: "8F8C8AAC-5EF2-477E-9A84-95BF96FA76CD", versionEndExcluding: "16.2.0", versionStartIncluding: "6.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "463EA623-0DC2-4287-A9AC-837CBDECF76C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "E798352C-E09B-4D18-B3A8-CFCDE0AD3675", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "21CC610A-0561-46A1-9077-D01D5C3F1A8F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", matchCriteriaId: "8B36ABBC-DB27-44D1-B844-00DFC3BBF043", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", matchCriteriaId: "C6E4BC24-6583-4791-9ED9-D2D675187DCD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", matchCriteriaId: "D236ABC2-93E4-4428-B949-7E17945E4D98", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "CED78B28-BBBF-4869-BC1C-F0789867FB4C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", matchCriteriaId: "0C79890F-0B41-4855-84EE-78D5896C87A1", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", matchCriteriaId: "4400D339-BB12-414A-B891-B6105D7FCA39", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", matchCriteriaId: "6871A74E-8B92-4892-970F-757F404590CB", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", matchCriteriaId: "03DE7DE4-DC4B-40F3-BB22-B8E524081942", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", matchCriteriaId: "9F8037F0-C124-4EFB-AEA1-89441975D36F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", matchCriteriaId: "9C37E74B-DA76-4E59-953E-C50D0D75804A", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", matchCriteriaId: "B0B195E2-6076-487C-899F-A40B886BA556", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", matchCriteriaId: "6C4E7C31-D08D-487F-B7FF-9502783FFDB9", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", matchCriteriaId: "F4AEDEEE-5070-41E2-B4DC-6DE8456BC028", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", matchCriteriaId: "7097AFD0-5A8C-4C62-AAF7-16FB71DE210C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "A661B972-912C-4DAA-9518-CC01E0EB1A81", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "76C1D9F0-48A8-4193-A781-B19ACE1B0B4B", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "9FB81A97-4BE8-4570-914F-304F38968613", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", matchCriteriaId: "CE14782A-4AD2-4633-8A3A-D81D5C434046", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", matchCriteriaId: "4A1BABCB-EDD7-4B1D-AE49-77DD1A3CCB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", matchCriteriaId: "4F89B350-B20F-45A8-8809-E9776C319591", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "2B10E09F-84F3-42E3-9B8D-DE309ED4A4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", matchCriteriaId: "7C12A1AA-66F0-452F-9B75-562F4A979CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", matchCriteriaId: "33A13944-145E-453E-A409-BE4A984619AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A10A8E35-923F-483B-A924-441B78FFCF6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", matchCriteriaId: "938DDBFF-A0CC-4311-9F30-08ABDBB67742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB49716D-8E0B-4E4C-B206-104BB64F6301", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8B0237-9A91-4954-AFBE-E661467D842A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B3B0B5A-27F2-4E08-8B75-1EAAC4DC840D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0B80AF0C-EFED-4CA0-B990-0ADA6F1D0AEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B4348FF-8691-4832-9103-F46282924299", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", matchCriteriaId: "07737420-567D-49CC-9A9E-555038DFF0AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3A5D57-DB2C-429F-BB3F-8EB7F4767E1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", matchCriteriaId: "FD4CA442-BC30-407E-851E-E03037E75E8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9826969F-D449-4032-8A0B-050D7CC3B1AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", matchCriteriaId: "858F9CAA-E6D3-4F1D-923D-ED9E05C3AC54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61A13AD1-22F7-4FFD-BCB7-A4FDAF2BA659", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", matchCriteriaId: "009853DA-ACAE-4928-AE90-090A3739BD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "476C7885-89D2-4A6C-94FE-E06B55A23E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF10CF6-1C1D-4768-A349-1AEFD26F491A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper privilege management in Jungo WinDriver 6.0.0 through 16.1.0 allows local attackers to escalate privileges and execute arbitrary code.", }, { lang: "es", value: "La gestión inadecuada de privilegios en Jungo WinDriver 6.0.0 a 16.1.0 permite a atacantes locales escalar privilegios y ejecutar código arbitrario.", }, ], id: "CVE-2024-26314", lastModified: "2024-11-21T09:02:21.567", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-07-02T16:15:04.330", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-07-02 16:15
Modified
2024-11-21 08:55
Severity ?
Summary
Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.5.1 allows local attackers to cause a Windows blue screen error.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jungo.com/windriver/versions/ | Release Notes | |
cve@mitre.org | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jungo.com/windriver/versions/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", matchCriteriaId: "CD5769FE-170B-4FCC-9A2E-B487C2DAFB16", versionEndExcluding: "12.5.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "463EA623-0DC2-4287-A9AC-837CBDECF76C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "E798352C-E09B-4D18-B3A8-CFCDE0AD3675", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "21CC610A-0561-46A1-9077-D01D5C3F1A8F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", matchCriteriaId: "8B36ABBC-DB27-44D1-B844-00DFC3BBF043", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", matchCriteriaId: "C6E4BC24-6583-4791-9ED9-D2D675187DCD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", matchCriteriaId: "D236ABC2-93E4-4428-B949-7E17945E4D98", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "CED78B28-BBBF-4869-BC1C-F0789867FB4C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", matchCriteriaId: "0C79890F-0B41-4855-84EE-78D5896C87A1", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", matchCriteriaId: "4400D339-BB12-414A-B891-B6105D7FCA39", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", matchCriteriaId: "6871A74E-8B92-4892-970F-757F404590CB", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", matchCriteriaId: "03DE7DE4-DC4B-40F3-BB22-B8E524081942", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", matchCriteriaId: "9F8037F0-C124-4EFB-AEA1-89441975D36F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", matchCriteriaId: "9C37E74B-DA76-4E59-953E-C50D0D75804A", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", matchCriteriaId: "B0B195E2-6076-487C-899F-A40B886BA556", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", matchCriteriaId: "6C4E7C31-D08D-487F-B7FF-9502783FFDB9", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", matchCriteriaId: "F4AEDEEE-5070-41E2-B4DC-6DE8456BC028", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", matchCriteriaId: "7097AFD0-5A8C-4C62-AAF7-16FB71DE210C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "A661B972-912C-4DAA-9518-CC01E0EB1A81", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "76C1D9F0-48A8-4193-A781-B19ACE1B0B4B", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "9FB81A97-4BE8-4570-914F-304F38968613", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", matchCriteriaId: "CE14782A-4AD2-4633-8A3A-D81D5C434046", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", matchCriteriaId: "4A1BABCB-EDD7-4B1D-AE49-77DD1A3CCB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", matchCriteriaId: "4F89B350-B20F-45A8-8809-E9776C319591", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "2B10E09F-84F3-42E3-9B8D-DE309ED4A4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", matchCriteriaId: "7C12A1AA-66F0-452F-9B75-562F4A979CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", matchCriteriaId: "33A13944-145E-453E-A409-BE4A984619AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A10A8E35-923F-483B-A924-441B78FFCF6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", matchCriteriaId: "938DDBFF-A0CC-4311-9F30-08ABDBB67742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB49716D-8E0B-4E4C-B206-104BB64F6301", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8B0237-9A91-4954-AFBE-E661467D842A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B3B0B5A-27F2-4E08-8B75-1EAAC4DC840D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0B80AF0C-EFED-4CA0-B990-0ADA6F1D0AEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B4348FF-8691-4832-9103-F46282924299", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", matchCriteriaId: "07737420-567D-49CC-9A9E-555038DFF0AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3A5D57-DB2C-429F-BB3F-8EB7F4767E1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", matchCriteriaId: "FD4CA442-BC30-407E-851E-E03037E75E8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9826969F-D449-4032-8A0B-050D7CC3B1AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", matchCriteriaId: "858F9CAA-E6D3-4F1D-923D-ED9E05C3AC54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61A13AD1-22F7-4FFD-BCB7-A4FDAF2BA659", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", matchCriteriaId: "009853DA-ACAE-4928-AE90-090A3739BD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "476C7885-89D2-4A6C-94FE-E06B55A23E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF10CF6-1C1D-4768-A349-1AEFD26F491A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.5.1 allows local attackers to cause a Windows blue screen error.", }, { lang: "es", value: "Vulnerabilidad de denegación de servicio (DoS) en Jungo WinDriver anterior a 12.5.1 permite a atacantes locales provocar un error de pantalla azul de Windows.", }, ], id: "CVE-2024-22105", lastModified: "2024-11-21T08:55:35.950", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-07-02T16:15:03.877", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-404", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-07-02 15:15
Modified
2024-11-21 08:38
Severity ?
Summary
Improper privilege management in Jungo WinDriver before 12.1.0 allows local attackers to escalate privileges and execute arbitrary code.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jungo.com/windriver/versions/ | Release Notes | |
cve@mitre.org | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jungo.com/windriver/versions/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", matchCriteriaId: "B3FD78BE-8090-4C8C-B6E3-539B78958FBD", versionEndExcluding: "12.1.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "463EA623-0DC2-4287-A9AC-837CBDECF76C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "E798352C-E09B-4D18-B3A8-CFCDE0AD3675", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "21CC610A-0561-46A1-9077-D01D5C3F1A8F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", matchCriteriaId: "8B36ABBC-DB27-44D1-B844-00DFC3BBF043", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", matchCriteriaId: "C6E4BC24-6583-4791-9ED9-D2D675187DCD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", matchCriteriaId: "D236ABC2-93E4-4428-B949-7E17945E4D98", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "CED78B28-BBBF-4869-BC1C-F0789867FB4C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", matchCriteriaId: "0C79890F-0B41-4855-84EE-78D5896C87A1", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", matchCriteriaId: "4400D339-BB12-414A-B891-B6105D7FCA39", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", matchCriteriaId: "6871A74E-8B92-4892-970F-757F404590CB", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", matchCriteriaId: "03DE7DE4-DC4B-40F3-BB22-B8E524081942", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", matchCriteriaId: "9F8037F0-C124-4EFB-AEA1-89441975D36F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", matchCriteriaId: "9C37E74B-DA76-4E59-953E-C50D0D75804A", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", matchCriteriaId: "B0B195E2-6076-487C-899F-A40B886BA556", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", matchCriteriaId: "6C4E7C31-D08D-487F-B7FF-9502783FFDB9", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", matchCriteriaId: "F4AEDEEE-5070-41E2-B4DC-6DE8456BC028", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", matchCriteriaId: "7097AFD0-5A8C-4C62-AAF7-16FB71DE210C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "A661B972-912C-4DAA-9518-CC01E0EB1A81", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "76C1D9F0-48A8-4193-A781-B19ACE1B0B4B", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "9FB81A97-4BE8-4570-914F-304F38968613", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", matchCriteriaId: "CE14782A-4AD2-4633-8A3A-D81D5C434046", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", matchCriteriaId: "4A1BABCB-EDD7-4B1D-AE49-77DD1A3CCB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", matchCriteriaId: "4F89B350-B20F-45A8-8809-E9776C319591", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "2B10E09F-84F3-42E3-9B8D-DE309ED4A4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", matchCriteriaId: "7C12A1AA-66F0-452F-9B75-562F4A979CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", matchCriteriaId: "33A13944-145E-453E-A409-BE4A984619AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A10A8E35-923F-483B-A924-441B78FFCF6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", matchCriteriaId: "938DDBFF-A0CC-4311-9F30-08ABDBB67742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB49716D-8E0B-4E4C-B206-104BB64F6301", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8B0237-9A91-4954-AFBE-E661467D842A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B3B0B5A-27F2-4E08-8B75-1EAAC4DC840D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0B80AF0C-EFED-4CA0-B990-0ADA6F1D0AEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B4348FF-8691-4832-9103-F46282924299", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", matchCriteriaId: "07737420-567D-49CC-9A9E-555038DFF0AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3A5D57-DB2C-429F-BB3F-8EB7F4767E1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", matchCriteriaId: "FD4CA442-BC30-407E-851E-E03037E75E8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9826969F-D449-4032-8A0B-050D7CC3B1AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", matchCriteriaId: "858F9CAA-E6D3-4F1D-923D-ED9E05C3AC54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61A13AD1-22F7-4FFD-BCB7-A4FDAF2BA659", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", matchCriteriaId: "009853DA-ACAE-4928-AE90-090A3739BD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "476C7885-89D2-4A6C-94FE-E06B55A23E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF10CF6-1C1D-4768-A349-1AEFD26F491A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper privilege management in Jungo WinDriver before 12.1.0 allows local attackers to escalate privileges and execute arbitrary code.", }, { lang: "es", value: "La gestión inadecuada de privilegios en Jungo WinDriver anterior a 12.1.0 permite a atacantes locales escalar privilegios y ejecutar código arbitrario.", }, ], id: "CVE-2023-51776", lastModified: "2024-11-21T08:38:46.690", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-07-02T15:15:10.663", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-07-02 16:15
Modified
2024-11-21 08:55
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Summary
Improper privilege management in Jungo WinDriver before 12.5.1 allows local attackers to escalate privileges, execute arbitrary code, or cause a Denial of Service (DoS).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jungo.com/windriver/versions/ | Release Notes | |
cve@mitre.org | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jungo.com/windriver/versions/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", matchCriteriaId: "CD5769FE-170B-4FCC-9A2E-B487C2DAFB16", versionEndExcluding: "12.5.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "463EA623-0DC2-4287-A9AC-837CBDECF76C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "E798352C-E09B-4D18-B3A8-CFCDE0AD3675", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "21CC610A-0561-46A1-9077-D01D5C3F1A8F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", matchCriteriaId: "8B36ABBC-DB27-44D1-B844-00DFC3BBF043", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", matchCriteriaId: "C6E4BC24-6583-4791-9ED9-D2D675187DCD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", matchCriteriaId: "D236ABC2-93E4-4428-B949-7E17945E4D98", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "CED78B28-BBBF-4869-BC1C-F0789867FB4C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", matchCriteriaId: "0C79890F-0B41-4855-84EE-78D5896C87A1", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", matchCriteriaId: "4400D339-BB12-414A-B891-B6105D7FCA39", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", matchCriteriaId: "6871A74E-8B92-4892-970F-757F404590CB", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", matchCriteriaId: "03DE7DE4-DC4B-40F3-BB22-B8E524081942", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", matchCriteriaId: "9F8037F0-C124-4EFB-AEA1-89441975D36F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", matchCriteriaId: "9C37E74B-DA76-4E59-953E-C50D0D75804A", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", matchCriteriaId: "B0B195E2-6076-487C-899F-A40B886BA556", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", matchCriteriaId: "6C4E7C31-D08D-487F-B7FF-9502783FFDB9", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", matchCriteriaId: "F4AEDEEE-5070-41E2-B4DC-6DE8456BC028", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", matchCriteriaId: "7097AFD0-5A8C-4C62-AAF7-16FB71DE210C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "A661B972-912C-4DAA-9518-CC01E0EB1A81", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "76C1D9F0-48A8-4193-A781-B19ACE1B0B4B", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "9FB81A97-4BE8-4570-914F-304F38968613", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", matchCriteriaId: "CE14782A-4AD2-4633-8A3A-D81D5C434046", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", matchCriteriaId: "4A1BABCB-EDD7-4B1D-AE49-77DD1A3CCB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", matchCriteriaId: "4F89B350-B20F-45A8-8809-E9776C319591", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "2B10E09F-84F3-42E3-9B8D-DE309ED4A4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", matchCriteriaId: "7C12A1AA-66F0-452F-9B75-562F4A979CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", matchCriteriaId: "33A13944-145E-453E-A409-BE4A984619AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A10A8E35-923F-483B-A924-441B78FFCF6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", matchCriteriaId: "938DDBFF-A0CC-4311-9F30-08ABDBB67742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB49716D-8E0B-4E4C-B206-104BB64F6301", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8B0237-9A91-4954-AFBE-E661467D842A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B3B0B5A-27F2-4E08-8B75-1EAAC4DC840D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0B80AF0C-EFED-4CA0-B990-0ADA6F1D0AEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B4348FF-8691-4832-9103-F46282924299", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", matchCriteriaId: "07737420-567D-49CC-9A9E-555038DFF0AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3A5D57-DB2C-429F-BB3F-8EB7F4767E1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", matchCriteriaId: "FD4CA442-BC30-407E-851E-E03037E75E8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9826969F-D449-4032-8A0B-050D7CC3B1AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", matchCriteriaId: "858F9CAA-E6D3-4F1D-923D-ED9E05C3AC54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61A13AD1-22F7-4FFD-BCB7-A4FDAF2BA659", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", matchCriteriaId: "009853DA-ACAE-4928-AE90-090A3739BD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "476C7885-89D2-4A6C-94FE-E06B55A23E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF10CF6-1C1D-4768-A349-1AEFD26F491A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper privilege management in Jungo WinDriver before 12.5.1 allows local attackers to escalate privileges, execute arbitrary code, or cause a Denial of Service (DoS).", }, { lang: "es", value: "La gestión inadecuada de privilegios en Jungo WinDriver anterior a 12.5.1 permite a atacantes locales escalar privilegios, ejecutar código arbitrario o provocar una denegación de servicio (DoS).", }, ], id: "CVE-2024-22106", lastModified: "2024-11-21T08:55:36.177", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2, impactScore: 6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-07-02T16:15:03.980", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-269", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-07-02 15:15
Modified
2024-11-21 08:55
Severity ?
Summary
Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.6.0 allows local attackers to cause a Windows blue screen error.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jungo.com/windriver/versions/ | Release Notes | |
cve@mitre.org | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jungo.com/windriver/versions/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", matchCriteriaId: "14DB96B1-125F-4E91-AB5A-A3A32627B0F2", versionEndExcluding: "12.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "463EA623-0DC2-4287-A9AC-837CBDECF76C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "E798352C-E09B-4D18-B3A8-CFCDE0AD3675", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "21CC610A-0561-46A1-9077-D01D5C3F1A8F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", matchCriteriaId: "8B36ABBC-DB27-44D1-B844-00DFC3BBF043", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", matchCriteriaId: "C6E4BC24-6583-4791-9ED9-D2D675187DCD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", matchCriteriaId: "D236ABC2-93E4-4428-B949-7E17945E4D98", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "CED78B28-BBBF-4869-BC1C-F0789867FB4C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", matchCriteriaId: "0C79890F-0B41-4855-84EE-78D5896C87A1", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", matchCriteriaId: "4400D339-BB12-414A-B891-B6105D7FCA39", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", matchCriteriaId: "6871A74E-8B92-4892-970F-757F404590CB", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", matchCriteriaId: "03DE7DE4-DC4B-40F3-BB22-B8E524081942", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", matchCriteriaId: "9F8037F0-C124-4EFB-AEA1-89441975D36F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", matchCriteriaId: "9C37E74B-DA76-4E59-953E-C50D0D75804A", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", matchCriteriaId: "B0B195E2-6076-487C-899F-A40B886BA556", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", matchCriteriaId: "6C4E7C31-D08D-487F-B7FF-9502783FFDB9", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", matchCriteriaId: "F4AEDEEE-5070-41E2-B4DC-6DE8456BC028", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", matchCriteriaId: "7097AFD0-5A8C-4C62-AAF7-16FB71DE210C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "A661B972-912C-4DAA-9518-CC01E0EB1A81", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "76C1D9F0-48A8-4193-A781-B19ACE1B0B4B", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "9FB81A97-4BE8-4570-914F-304F38968613", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", matchCriteriaId: "CE14782A-4AD2-4633-8A3A-D81D5C434046", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", matchCriteriaId: "4A1BABCB-EDD7-4B1D-AE49-77DD1A3CCB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", matchCriteriaId: "4F89B350-B20F-45A8-8809-E9776C319591", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "2B10E09F-84F3-42E3-9B8D-DE309ED4A4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", matchCriteriaId: "7C12A1AA-66F0-452F-9B75-562F4A979CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", matchCriteriaId: "33A13944-145E-453E-A409-BE4A984619AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A10A8E35-923F-483B-A924-441B78FFCF6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", matchCriteriaId: "938DDBFF-A0CC-4311-9F30-08ABDBB67742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB49716D-8E0B-4E4C-B206-104BB64F6301", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8B0237-9A91-4954-AFBE-E661467D842A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B3B0B5A-27F2-4E08-8B75-1EAAC4DC840D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0B80AF0C-EFED-4CA0-B990-0ADA6F1D0AEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B4348FF-8691-4832-9103-F46282924299", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", matchCriteriaId: "07737420-567D-49CC-9A9E-555038DFF0AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3A5D57-DB2C-429F-BB3F-8EB7F4767E1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", matchCriteriaId: "FD4CA442-BC30-407E-851E-E03037E75E8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9826969F-D449-4032-8A0B-050D7CC3B1AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", matchCriteriaId: "858F9CAA-E6D3-4F1D-923D-ED9E05C3AC54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61A13AD1-22F7-4FFD-BCB7-A4FDAF2BA659", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", matchCriteriaId: "009853DA-ACAE-4928-AE90-090A3739BD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "476C7885-89D2-4A6C-94FE-E06B55A23E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF10CF6-1C1D-4768-A349-1AEFD26F491A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.6.0 allows local attackers to cause a Windows blue screen error.", }, { lang: "es", value: "Vulnerabilidad de denegación de servicio (DoS) en Jungo WinDriver anterior a 12.6.0 permite a atacantes locales provocar un error de pantalla azul de Windows.", }, ], id: "CVE-2024-22102", lastModified: "2024-11-21T08:55:35.143", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-07-02T15:15:11.070", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-07-02 15:15
Modified
2024-11-21 08:38
Severity ?
Summary
Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jungo.com/windriver/versions/ | Release Notes | |
cve@mitre.org | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jungo.com/windriver/versions/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", matchCriteriaId: "B3FD78BE-8090-4C8C-B6E3-539B78958FBD", versionEndExcluding: "12.1.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "463EA623-0DC2-4287-A9AC-837CBDECF76C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "E798352C-E09B-4D18-B3A8-CFCDE0AD3675", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "21CC610A-0561-46A1-9077-D01D5C3F1A8F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", matchCriteriaId: "8B36ABBC-DB27-44D1-B844-00DFC3BBF043", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", matchCriteriaId: "C6E4BC24-6583-4791-9ED9-D2D675187DCD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", matchCriteriaId: "D236ABC2-93E4-4428-B949-7E17945E4D98", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "CED78B28-BBBF-4869-BC1C-F0789867FB4C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", matchCriteriaId: "0C79890F-0B41-4855-84EE-78D5896C87A1", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", matchCriteriaId: "4400D339-BB12-414A-B891-B6105D7FCA39", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", matchCriteriaId: "6871A74E-8B92-4892-970F-757F404590CB", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", matchCriteriaId: "03DE7DE4-DC4B-40F3-BB22-B8E524081942", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", matchCriteriaId: "9F8037F0-C124-4EFB-AEA1-89441975D36F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", matchCriteriaId: "9C37E74B-DA76-4E59-953E-C50D0D75804A", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", matchCriteriaId: "B0B195E2-6076-487C-899F-A40B886BA556", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", matchCriteriaId: "6C4E7C31-D08D-487F-B7FF-9502783FFDB9", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", matchCriteriaId: "F4AEDEEE-5070-41E2-B4DC-6DE8456BC028", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", matchCriteriaId: "7097AFD0-5A8C-4C62-AAF7-16FB71DE210C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "A661B972-912C-4DAA-9518-CC01E0EB1A81", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "76C1D9F0-48A8-4193-A781-B19ACE1B0B4B", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "9FB81A97-4BE8-4570-914F-304F38968613", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", matchCriteriaId: "CE14782A-4AD2-4633-8A3A-D81D5C434046", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", matchCriteriaId: "4A1BABCB-EDD7-4B1D-AE49-77DD1A3CCB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", matchCriteriaId: "4F89B350-B20F-45A8-8809-E9776C319591", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "2B10E09F-84F3-42E3-9B8D-DE309ED4A4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", matchCriteriaId: "7C12A1AA-66F0-452F-9B75-562F4A979CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", matchCriteriaId: "33A13944-145E-453E-A409-BE4A984619AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A10A8E35-923F-483B-A924-441B78FFCF6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", matchCriteriaId: "938DDBFF-A0CC-4311-9F30-08ABDBB67742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB49716D-8E0B-4E4C-B206-104BB64F6301", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8B0237-9A91-4954-AFBE-E661467D842A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B3B0B5A-27F2-4E08-8B75-1EAAC4DC840D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0B80AF0C-EFED-4CA0-B990-0ADA6F1D0AEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B4348FF-8691-4832-9103-F46282924299", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", matchCriteriaId: "07737420-567D-49CC-9A9E-555038DFF0AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3A5D57-DB2C-429F-BB3F-8EB7F4767E1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", matchCriteriaId: "FD4CA442-BC30-407E-851E-E03037E75E8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9826969F-D449-4032-8A0B-050D7CC3B1AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", matchCriteriaId: "858F9CAA-E6D3-4F1D-923D-ED9E05C3AC54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61A13AD1-22F7-4FFD-BCB7-A4FDAF2BA659", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", matchCriteriaId: "009853DA-ACAE-4928-AE90-090A3739BD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "476C7885-89D2-4A6C-94FE-E06B55A23E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF10CF6-1C1D-4768-A349-1AEFD26F491A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).", }, { lang: "es", value: "La vulnerabilidad de escritura fuera de los límites en Jungo WinDriver anterior a 12.1.0 permite a atacantes locales provocar un error de pantalla azul de Windows y denegación de servicio (DoS).", }, ], id: "CVE-2023-51778", lastModified: "2024-11-21T08:38:47.140", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-07-02T15:15:10.890", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-07-02 15:15
Modified
2024-11-21 08:55
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.5.1 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jungo.com/windriver/versions/ | Release Notes | |
cve@mitre.org | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jungo.com/windriver/versions/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", matchCriteriaId: "CD5769FE-170B-4FCC-9A2E-B487C2DAFB16", versionEndExcluding: "12.5.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "463EA623-0DC2-4287-A9AC-837CBDECF76C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "E798352C-E09B-4D18-B3A8-CFCDE0AD3675", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "21CC610A-0561-46A1-9077-D01D5C3F1A8F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", matchCriteriaId: "8B36ABBC-DB27-44D1-B844-00DFC3BBF043", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", matchCriteriaId: "C6E4BC24-6583-4791-9ED9-D2D675187DCD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", matchCriteriaId: "D236ABC2-93E4-4428-B949-7E17945E4D98", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "CED78B28-BBBF-4869-BC1C-F0789867FB4C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", matchCriteriaId: "0C79890F-0B41-4855-84EE-78D5896C87A1", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", matchCriteriaId: "4400D339-BB12-414A-B891-B6105D7FCA39", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", matchCriteriaId: "6871A74E-8B92-4892-970F-757F404590CB", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", matchCriteriaId: "03DE7DE4-DC4B-40F3-BB22-B8E524081942", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", matchCriteriaId: "9F8037F0-C124-4EFB-AEA1-89441975D36F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", matchCriteriaId: "9C37E74B-DA76-4E59-953E-C50D0D75804A", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", matchCriteriaId: "B0B195E2-6076-487C-899F-A40B886BA556", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", matchCriteriaId: "6C4E7C31-D08D-487F-B7FF-9502783FFDB9", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", matchCriteriaId: "F4AEDEEE-5070-41E2-B4DC-6DE8456BC028", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", matchCriteriaId: "7097AFD0-5A8C-4C62-AAF7-16FB71DE210C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "A661B972-912C-4DAA-9518-CC01E0EB1A81", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "76C1D9F0-48A8-4193-A781-B19ACE1B0B4B", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "9FB81A97-4BE8-4570-914F-304F38968613", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", matchCriteriaId: "CE14782A-4AD2-4633-8A3A-D81D5C434046", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", matchCriteriaId: "4A1BABCB-EDD7-4B1D-AE49-77DD1A3CCB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", matchCriteriaId: "4F89B350-B20F-45A8-8809-E9776C319591", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "2B10E09F-84F3-42E3-9B8D-DE309ED4A4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", matchCriteriaId: "7C12A1AA-66F0-452F-9B75-562F4A979CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", matchCriteriaId: "33A13944-145E-453E-A409-BE4A984619AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A10A8E35-923F-483B-A924-441B78FFCF6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", matchCriteriaId: "938DDBFF-A0CC-4311-9F30-08ABDBB67742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB49716D-8E0B-4E4C-B206-104BB64F6301", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8B0237-9A91-4954-AFBE-E661467D842A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B3B0B5A-27F2-4E08-8B75-1EAAC4DC840D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0B80AF0C-EFED-4CA0-B990-0ADA6F1D0AEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B4348FF-8691-4832-9103-F46282924299", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", matchCriteriaId: "07737420-567D-49CC-9A9E-555038DFF0AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3A5D57-DB2C-429F-BB3F-8EB7F4767E1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", matchCriteriaId: "FD4CA442-BC30-407E-851E-E03037E75E8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9826969F-D449-4032-8A0B-050D7CC3B1AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", matchCriteriaId: "858F9CAA-E6D3-4F1D-923D-ED9E05C3AC54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61A13AD1-22F7-4FFD-BCB7-A4FDAF2BA659", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", matchCriteriaId: "009853DA-ACAE-4928-AE90-090A3739BD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "476C7885-89D2-4A6C-94FE-E06B55A23E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF10CF6-1C1D-4768-A349-1AEFD26F491A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.5.1 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).", }, { lang: "es", value: "La vulnerabilidad de escritura fuera de los límites en Jungo WinDriver anterior a 12.5.1 permite a atacantes locales provocar un error de pantalla azul de Windows y denegación de servicio (DoS).", }, ], id: "CVE-2024-22104", lastModified: "2024-11-21T08:55:35.653", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-07-02T15:15:11.227", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-07-02 15:15
Modified
2024-11-21 08:38
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jungo.com/windriver/versions/ | Release Notes | |
cve@mitre.org | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jungo.com/windriver/versions/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", matchCriteriaId: "B3FD78BE-8090-4C8C-B6E3-539B78958FBD", versionEndExcluding: "12.1.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "463EA623-0DC2-4287-A9AC-837CBDECF76C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "E798352C-E09B-4D18-B3A8-CFCDE0AD3675", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "21CC610A-0561-46A1-9077-D01D5C3F1A8F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", matchCriteriaId: "8B36ABBC-DB27-44D1-B844-00DFC3BBF043", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", matchCriteriaId: "C6E4BC24-6583-4791-9ED9-D2D675187DCD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", matchCriteriaId: "D236ABC2-93E4-4428-B949-7E17945E4D98", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "CED78B28-BBBF-4869-BC1C-F0789867FB4C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", matchCriteriaId: "0C79890F-0B41-4855-84EE-78D5896C87A1", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", matchCriteriaId: "4400D339-BB12-414A-B891-B6105D7FCA39", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", matchCriteriaId: "6871A74E-8B92-4892-970F-757F404590CB", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", matchCriteriaId: "03DE7DE4-DC4B-40F3-BB22-B8E524081942", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", matchCriteriaId: "9F8037F0-C124-4EFB-AEA1-89441975D36F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", matchCriteriaId: "9C37E74B-DA76-4E59-953E-C50D0D75804A", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", matchCriteriaId: "B0B195E2-6076-487C-899F-A40B886BA556", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", matchCriteriaId: "6C4E7C31-D08D-487F-B7FF-9502783FFDB9", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", matchCriteriaId: "F4AEDEEE-5070-41E2-B4DC-6DE8456BC028", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", matchCriteriaId: "7097AFD0-5A8C-4C62-AAF7-16FB71DE210C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "A661B972-912C-4DAA-9518-CC01E0EB1A81", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "76C1D9F0-48A8-4193-A781-B19ACE1B0B4B", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "9FB81A97-4BE8-4570-914F-304F38968613", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", matchCriteriaId: "CE14782A-4AD2-4633-8A3A-D81D5C434046", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", matchCriteriaId: "4A1BABCB-EDD7-4B1D-AE49-77DD1A3CCB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", matchCriteriaId: "4F89B350-B20F-45A8-8809-E9776C319591", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "2B10E09F-84F3-42E3-9B8D-DE309ED4A4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", matchCriteriaId: "7C12A1AA-66F0-452F-9B75-562F4A979CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", matchCriteriaId: "33A13944-145E-453E-A409-BE4A984619AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A10A8E35-923F-483B-A924-441B78FFCF6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", matchCriteriaId: "938DDBFF-A0CC-4311-9F30-08ABDBB67742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB49716D-8E0B-4E4C-B206-104BB64F6301", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8B0237-9A91-4954-AFBE-E661467D842A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B3B0B5A-27F2-4E08-8B75-1EAAC4DC840D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0B80AF0C-EFED-4CA0-B990-0ADA6F1D0AEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B4348FF-8691-4832-9103-F46282924299", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", matchCriteriaId: "07737420-567D-49CC-9A9E-555038DFF0AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3A5D57-DB2C-429F-BB3F-8EB7F4767E1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", matchCriteriaId: "FD4CA442-BC30-407E-851E-E03037E75E8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9826969F-D449-4032-8A0B-050D7CC3B1AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", matchCriteriaId: "858F9CAA-E6D3-4F1D-923D-ED9E05C3AC54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61A13AD1-22F7-4FFD-BCB7-A4FDAF2BA659", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", matchCriteriaId: "009853DA-ACAE-4928-AE90-090A3739BD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "476C7885-89D2-4A6C-94FE-E06B55A23E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF10CF6-1C1D-4768-A349-1AEFD26F491A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error.", }, { lang: "es", value: "Vulnerabilidad de denegación de servicio (DoS) en Jungo WinDriver anterior a 12.1.0 permite a atacantes locales provocar un error de pantalla azul de Windows.", }, ], id: "CVE-2023-51777", lastModified: "2024-11-21T08:38:46.883", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-07-02T15:15:10.807", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-07-02 16:15
Modified
2024-11-21 09:00
Severity ?
Summary
Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.7.0 allows local attackers to cause a Windows blue screen error.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jungo.com/windriver/versions/ | Release Notes | |
cve@mitre.org | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jungo.com/windriver/versions/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", matchCriteriaId: "D1AD3035-A0C1-47C1-BBEB-10D8A93E8EC5", versionEndExcluding: "12.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "463EA623-0DC2-4287-A9AC-837CBDECF76C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "E798352C-E09B-4D18-B3A8-CFCDE0AD3675", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "21CC610A-0561-46A1-9077-D01D5C3F1A8F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", matchCriteriaId: "8B36ABBC-DB27-44D1-B844-00DFC3BBF043", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", matchCriteriaId: "C6E4BC24-6583-4791-9ED9-D2D675187DCD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", matchCriteriaId: "D236ABC2-93E4-4428-B949-7E17945E4D98", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "CED78B28-BBBF-4869-BC1C-F0789867FB4C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", matchCriteriaId: "0C79890F-0B41-4855-84EE-78D5896C87A1", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", matchCriteriaId: "4400D339-BB12-414A-B891-B6105D7FCA39", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", matchCriteriaId: "6871A74E-8B92-4892-970F-757F404590CB", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", matchCriteriaId: "03DE7DE4-DC4B-40F3-BB22-B8E524081942", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", matchCriteriaId: "9F8037F0-C124-4EFB-AEA1-89441975D36F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", matchCriteriaId: "9C37E74B-DA76-4E59-953E-C50D0D75804A", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", matchCriteriaId: "B0B195E2-6076-487C-899F-A40B886BA556", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", matchCriteriaId: "6C4E7C31-D08D-487F-B7FF-9502783FFDB9", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", matchCriteriaId: "F4AEDEEE-5070-41E2-B4DC-6DE8456BC028", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", matchCriteriaId: "7097AFD0-5A8C-4C62-AAF7-16FB71DE210C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "A661B972-912C-4DAA-9518-CC01E0EB1A81", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "76C1D9F0-48A8-4193-A781-B19ACE1B0B4B", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "9FB81A97-4BE8-4570-914F-304F38968613", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", matchCriteriaId: "CE14782A-4AD2-4633-8A3A-D81D5C434046", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", matchCriteriaId: "4A1BABCB-EDD7-4B1D-AE49-77DD1A3CCB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", matchCriteriaId: "4F89B350-B20F-45A8-8809-E9776C319591", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "2B10E09F-84F3-42E3-9B8D-DE309ED4A4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", matchCriteriaId: "7C12A1AA-66F0-452F-9B75-562F4A979CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", matchCriteriaId: "33A13944-145E-453E-A409-BE4A984619AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A10A8E35-923F-483B-A924-441B78FFCF6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", matchCriteriaId: "938DDBFF-A0CC-4311-9F30-08ABDBB67742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB49716D-8E0B-4E4C-B206-104BB64F6301", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8B0237-9A91-4954-AFBE-E661467D842A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B3B0B5A-27F2-4E08-8B75-1EAAC4DC840D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0B80AF0C-EFED-4CA0-B990-0ADA6F1D0AEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B4348FF-8691-4832-9103-F46282924299", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", matchCriteriaId: "07737420-567D-49CC-9A9E-555038DFF0AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3A5D57-DB2C-429F-BB3F-8EB7F4767E1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", matchCriteriaId: "FD4CA442-BC30-407E-851E-E03037E75E8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9826969F-D449-4032-8A0B-050D7CC3B1AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", matchCriteriaId: "858F9CAA-E6D3-4F1D-923D-ED9E05C3AC54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61A13AD1-22F7-4FFD-BCB7-A4FDAF2BA659", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", matchCriteriaId: "009853DA-ACAE-4928-AE90-090A3739BD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "476C7885-89D2-4A6C-94FE-E06B55A23E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF10CF6-1C1D-4768-A349-1AEFD26F491A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.7.0 allows local attackers to cause a Windows blue screen error.", }, { lang: "es", value: "Vulnerabilidad de denegación de servicio (DoS) en Jungo WinDriver anterior a 12.7.0 permite a atacantes locales provocar un error de pantalla azul de Windows.", }, ], id: "CVE-2024-25087", lastModified: "2024-11-21T09:00:13.447", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-07-02T16:15:04.157", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-404", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2024-07-02 15:15
Modified
2024-11-21 08:55
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4.4 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
4.4 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
Summary
Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.6.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://jungo.com/windriver/versions/ | Release Notes | |
cve@mitre.org | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jungo.com/windriver/versions/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf | Third Party Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", matchCriteriaId: "14DB96B1-125F-4E91-AB5A-A3A32627B0F2", versionEndExcluding: "12.6.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "463EA623-0DC2-4287-A9AC-837CBDECF76C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "E798352C-E09B-4D18-B3A8-CFCDE0AD3675", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*", matchCriteriaId: "21CC610A-0561-46A1-9077-D01D5C3F1A8F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:data_transfer_classic:*:*:*:*:*:*:*:*", matchCriteriaId: "8B36ABBC-DB27-44D1-B844-00DFC3BBF043", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*", matchCriteriaId: "C6E4BC24-6583-4791-9ED9-D2D675187DCD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*", matchCriteriaId: "D236ABC2-93E4-4428-B949-7E17945E4D98", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "CED78B28-BBBF-4869-BC1C-F0789867FB4C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*", matchCriteriaId: "0C79890F-0B41-4855-84EE-78D5896C87A1", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*", matchCriteriaId: "4400D339-BB12-414A-B891-B6105D7FCA39", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*", matchCriteriaId: "6871A74E-8B92-4892-970F-757F404590CB", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*", matchCriteriaId: "03DE7DE4-DC4B-40F3-BB22-B8E524081942", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*", matchCriteriaId: "9F8037F0-C124-4EFB-AEA1-89441975D36F", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*", matchCriteriaId: "9C37E74B-DA76-4E59-953E-C50D0D75804A", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*", matchCriteriaId: "B0B195E2-6076-487C-899F-A40B886BA556", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*", matchCriteriaId: "6C4E7C31-D08D-487F-B7FF-9502783FFDB9", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*", matchCriteriaId: "F4AEDEEE-5070-41E2-B4DC-6DE8456BC028", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:iq_works:*:*:*:*:*:*:*:*", matchCriteriaId: "7097AFD0-5A8C-4C62-AAF7-16FB71DE210C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "A661B972-912C-4DAA-9518-CC01E0EB1A81", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator:*:*:*:*:*:*:*:*", matchCriteriaId: "76C1D9F0-48A8-4193-A781-B19ACE1B0B4B", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*", matchCriteriaId: "9FB81A97-4BE8-4570-914F-304F38968613", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*", matchCriteriaId: "CE14782A-4AD2-4633-8A3A-D81D5C434046", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:*:*:*:*:*:*:*:*", matchCriteriaId: "4A1BABCB-EDD7-4B1D-AE49-77DD1A3CCB1C", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:numerical_control_device_communication:*:*:*:*:*:*:*:*", matchCriteriaId: "4F89B350-B20F-45A8-8809-E9776C319591", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:px_developer\\/monitor_tool:*:*:*:*:*:*:*:*", matchCriteriaId: "2B10E09F-84F3-42E3-9B8D-DE309ED4A4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*", matchCriteriaId: "7C12A1AA-66F0-452F-9B75-562F4A979CBD", vulnerable: true, }, { criteria: "cpe:2.3:a:mitsubishielectric:rt_visualbox:*:*:*:*:*:*:*:*", matchCriteriaId: "33A13944-145E-453E-A409-BE4A984619AA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:mrzjw3-mc2-utl_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A10A8E35-923F-483B-A924-441B78FFCF6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", matchCriteriaId: "938DDBFF-A0CC-4311-9F30-08ABDBB67742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw0dnc-mneth-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB49716D-8E0B-4E4C-B206-104BB64F6301", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8B0237-9A91-4954-AFBE-E661467D842A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccbd2-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B3B0B5A-27F2-4E08-8B75-1EAAC4DC840D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", matchCriteriaId: "0B80AF0C-EFED-4CA0-B990-0ADA6F1D0AEE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-j_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8B4348FF-8691-4832-9103-F46282924299", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", matchCriteriaId: "07737420-567D-49CC-9A9E-555038DFF0AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-ccief-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5D3A5D57-DB2C-429F-BB3F-8EB7F4767E1D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", matchCriteriaId: "FD4CA442-BC30-407E-851E-E03037E75E8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-mnetg-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9826969F-D449-4032-8A0B-050D7CC3B1AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-mnetg-b:-:*:*:*:*:*:*:*", matchCriteriaId: "858F9CAA-E6D3-4F1D-923D-ED9E05C3AC54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnc-qsccf-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61A13AD1-22F7-4FFD-BCB7-A4FDAF2BA659", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", matchCriteriaId: "009853DA-ACAE-4928-AE90-090A3739BD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:sw1dnd-emsdk-b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "476C7885-89D2-4A6C-94FE-E06B55A23E37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF10CF6-1C1D-4768-A349-1AEFD26F491A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.6.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).", }, { lang: "es", value: "La vulnerabilidad de escritura fuera de los límites en Jungo WinDriver anterior a 12.6.0 permite a atacantes locales provocar un error de pantalla azul de Windows y denegación de servicio (DoS).", }, ], id: "CVE-2024-22103", lastModified: "2024-11-21T08:55:35.383", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-07-02T15:15:11.150", references: [ { source: "cve@mitre.org", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://jungo.com/windriver/versions/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
cve-2024-25086
Vulnerability from cvelistv5
Published
2024-07-02 00:00
Modified
2024-08-01 23:36
Severity ?
EPSS score ?
Summary
Improper privilege management in Jungo WinDriver before 12.2.0 allows local attackers to escalate privileges and execute arbitrary code.
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:jungo:windriver:12.2.0:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "windriver", vendor: "jungo", versions: [ { lessThan: "12.2.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-25086", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-07-03T14:39:42.792039Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-94", description: "CWE-94 Improper Control of Generation of Code ('Code Injection')", lang: "en", type: "CWE", }, ], }, { descriptions: [ { cweId: "CWE-269", description: "CWE-269 Improper Privilege Management", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-03T14:45:40.596Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T23:36:21.814Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://jungo.com/windriver/versions/", }, { tags: [ "x_transferred", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { tags: [ "x_transferred", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Improper privilege management in Jungo WinDriver before 12.2.0 allows local attackers to escalate privileges and execute arbitrary code.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T15:46:35.142278", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://jungo.com/windriver/versions/", }, { url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2024-25086", datePublished: "2024-07-02T00:00:00", dateReserved: "2024-02-04T00:00:00", dateUpdated: "2024-08-01T23:36:21.814Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-25087
Vulnerability from cvelistv5
Published
2024-07-02 00:00
Modified
2024-10-30 14:18
Severity ?
EPSS score ?
Summary
Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.7.0 allows local attackers to cause a Windows blue screen error.
References
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-25087", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-07-02T19:41:50.366484Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-404", description: "CWE-404 Improper Resource Shutdown or Release", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-30T14:18:21.106Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T23:36:21.598Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://jungo.com/windriver/versions/", }, { tags: [ "x_transferred", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { tags: [ "x_transferred", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.7.0 allows local attackers to cause a Windows blue screen error.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T15:47:33.372813", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://jungo.com/windriver/versions/", }, { url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2024-25087", datePublished: "2024-07-02T00:00:00", dateReserved: "2024-02-04T00:00:00", dateUpdated: "2024-10-30T14:18:21.106Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-22104
Vulnerability from cvelistv5
Published
2024-07-02 00:00
Modified
2024-08-01 22:35
Severity ?
EPSS score ?
Summary
Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.5.1 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:jungo:windriver:12.5.1:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "windriver", vendor: "jungo", versions: [ { lessThan: "12.5.1", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-22104", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-07-03T14:47:59.796129Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400 Uncontrolled Resource Consumption", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-03T14:51:19.389Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T22:35:34.727Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://jungo.com/windriver/versions/", }, { tags: [ "x_transferred", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { tags: [ "x_transferred", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.5.1 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T15:44:29.372340", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://jungo.com/windriver/versions/", }, { url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2024-22104", datePublished: "2024-07-02T00:00:00", dateReserved: "2024-01-05T00:00:00", dateUpdated: "2024-08-01T22:35:34.727Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-25088
Vulnerability from cvelistv5
Published
2024-07-02 00:00
Modified
2024-08-01 23:36
Severity ?
EPSS score ?
Summary
Improper privilege management in Jungo WinDriver before 12.5.1 allows local attackers to escalate privileges and execute arbitrary code.
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "windriver", vendor: "jungo", versions: [ { lessThan: "12.5.1", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-25088", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-07-08T20:13:12.712262Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-269", description: "CWE-269 Improper Privilege Management", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-31T15:40:12.180Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T23:36:21.646Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://jungo.com/windriver/versions/", }, { tags: [ "x_transferred", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { tags: [ "x_transferred", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Improper privilege management in Jungo WinDriver before 12.5.1 allows local attackers to escalate privileges and execute arbitrary code.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T15:48:12.787970", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://jungo.com/windriver/versions/", }, { url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2024-25088", datePublished: "2024-07-02T00:00:00", dateReserved: "2024-02-04T00:00:00", dateUpdated: "2024-08-01T23:36:21.646Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-51777
Vulnerability from cvelistv5
Published
2024-07-02 00:00
Modified
2024-10-28 01:36
Severity ?
EPSS score ?
Summary
Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error.
References
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2023-51777", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-07-05T15:21:05.227409Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-28T01:36:09.405Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T22:48:11.361Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://jungo.com/windriver/versions/", }, { tags: [ "x_transferred", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { tags: [ "x_transferred", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T15:41:24.936205", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://jungo.com/windriver/versions/", }, { url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-51777", datePublished: "2024-07-02T00:00:00", dateReserved: "2023-12-25T00:00:00", dateUpdated: "2024-10-28T01:36:09.405Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-22106
Vulnerability from cvelistv5
Published
2024-07-02 00:00
Modified
2024-08-01 22:35
Severity ?
EPSS score ?
Summary
Improper privilege management in Jungo WinDriver before 12.5.1 allows local attackers to escalate privileges, execute arbitrary code, or cause a Denial of Service (DoS).
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:jungo:windriver:12.5.1:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "windriver", vendor: "jungo", versions: [ { lessThan: "12.5.1", status: "affected", version: "0", versionType: "semver", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-22106", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-07-02T21:21:41.420629Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-269", description: "CWE-269 Improper Privilege Management", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T21:24:36.463Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T22:35:34.826Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://jungo.com/windriver/versions/", }, { tags: [ "x_transferred", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { tags: [ "x_transferred", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Improper privilege management in Jungo WinDriver before 12.5.1 allows local attackers to escalate privileges, execute arbitrary code, or cause a Denial of Service (DoS).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T15:45:42.511740", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://jungo.com/windriver/versions/", }, { url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2024-22106", datePublished: "2024-07-02T00:00:00", dateReserved: "2024-01-05T00:00:00", dateUpdated: "2024-08-01T22:35:34.826Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-22102
Vulnerability from cvelistv5
Published
2024-07-02 00:00
Modified
2024-08-01 22:35
Severity ?
EPSS score ?
Summary
Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.6.0 allows local attackers to cause a Windows blue screen error.
References
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-22102", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-07-02T15:41:36.140573Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-07-02T15:41:46.989Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T22:35:34.840Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://jungo.com/windriver/versions/", }, { tags: [ "x_transferred", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { tags: [ "x_transferred", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.6.0 allows local attackers to cause a Windows blue screen error.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T15:42:59.370727", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://jungo.com/windriver/versions/", }, { url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2024-22102", datePublished: "2024-07-02T00:00:00", dateReserved: "2024-01-05T00:00:00", dateUpdated: "2024-08-01T22:35:34.840Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-22103
Vulnerability from cvelistv5
Published
2024-07-02 00:00
Modified
2024-08-01 22:35
Severity ?
EPSS score ?
Summary
Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.6.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:jungo:windriver:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "windriver", vendor: "jungo", versions: [ { lessThan: "12.6.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-22103", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-07-02T18:49:22.001562Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-787", description: "CWE-787 Out-of-bounds Write", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T18:54:12.081Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T22:35:34.690Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://jungo.com/windriver/versions/", }, { tags: [ "x_transferred", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { tags: [ "x_transferred", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.6.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T15:43:45.109251", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://jungo.com/windriver/versions/", }, { url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2024-22103", datePublished: "2024-07-02T00:00:00", dateReserved: "2024-01-05T00:00:00", dateUpdated: "2024-08-01T22:35:34.690Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-26314
Vulnerability from cvelistv5
Published
2024-07-02 00:00
Modified
2024-08-02 00:07
Severity ?
EPSS score ?
Summary
Improper privilege management in Jungo WinDriver 6.0.0 through 16.1.0 allows local attackers to escalate privileges and execute arbitrary code.
References
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "cpu_module_logging_configuration_tool", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:gx_works2:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "gx_works2", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:cw_configurator:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "cw_configurator", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:data_transfer:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "data_transfer", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:ezsocket:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ezsocket", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "fr_configurator_sw3", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:fr_configurator2:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "fr_configurator2", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:iconics:genesis64:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "genesis64", vendor: "iconics", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:gt_designer3:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "gt_designer3", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:gt_softgot1000:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "gt_softgot1000", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:gt_softgot2000:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "gt_softgot2000", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:gx_developer:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "gx_developer", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:gx_logviewer:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "gx_logviewer", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:gx_works2:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "gx_works2", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:gx_works3:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "gx_works3", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:melsoft_navigator:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "melsoft_navigator", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:mi_configurator:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mi_configurator", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:fcsb1224:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "fcsb1224", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:mr_configurator2:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mr_configurator2", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:mrzjw3-mc2-utl:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mrzjw3-mc2-utl", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:mx_component:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx_component", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:mx_opc_server_da\\/ua:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx_opc_server_da\\/ua", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:px_developer:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "px_developer", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:rt_toolbox3:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "rt_toolbox3", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:rt_visualbox:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "rt_visualbox", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:c_controller_module_setting_and_monitoring_tool:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "c_controller_module_setting_and_monitoring_tool", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:sw0dnc-mneth-b:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sw0dnc-mneth-b", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:sw1dnc-ccbd2-b:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sw1dnc-ccbd2-b", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:sw1dnc-ccief-j:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sw1dnc-ccief-j", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:sw1dnc-ccief-b:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sw1dnc-ccief-b", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:sw1dnc-mnetg-b:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sw1dnc-mnetg-b", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:sw1dnc-qsccf-b:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sw1dnc-qsccf-b", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:mitsubishielectric:sw1dnd-emsdk-b:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sw1dnd-emsdk-b", vendor: "mitsubishielectric", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-26314", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-07-09T16:03:22.624752Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-07-09T17:46:04.803Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T00:07:19.173Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://jungo.com/windriver/versions/", }, { tags: [ "x_transferred", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { tags: [ "x_transferred", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Improper privilege management in Jungo WinDriver 6.0.0 through 16.1.0 allows local attackers to escalate privileges and execute arbitrary code.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T15:39:18.038388", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://jungo.com/windriver/versions/", }, { url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2024-26314", datePublished: "2024-07-02T00:00:00", dateReserved: "2024-02-19T00:00:00", dateUpdated: "2024-08-02T00:07:19.173Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-51778
Vulnerability from cvelistv5
Published
2024-07-02 00:00
Modified
2024-08-02 22:48
Severity ?
EPSS score ?
Summary
Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).
References
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2023-51778", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-07-23T15:40:06.299349Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-07-23T15:40:15.966Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T22:48:11.361Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://jungo.com/windriver/versions/", }, { tags: [ "x_transferred", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { tags: [ "x_transferred", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T15:42:00.481680", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://jungo.com/windriver/versions/", }, { url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-51778", datePublished: "2024-07-02T00:00:00", dateReserved: "2023-12-25T00:00:00", dateUpdated: "2024-08-02T22:48:11.361Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-22105
Vulnerability from cvelistv5
Published
2024-07-02 00:00
Modified
2024-10-30 18:02
Severity ?
EPSS score ?
Summary
Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.5.1 allows local attackers to cause a Windows blue screen error.
References
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-22105", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-07-02T19:42:22.254120Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-404", description: "CWE-404 Improper Resource Shutdown or Release", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-30T18:02:22.759Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T22:35:34.819Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://jungo.com/windriver/versions/", }, { tags: [ "x_transferred", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { tags: [ "x_transferred", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.5.1 allows local attackers to cause a Windows blue screen error.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T15:45:08.292960", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://jungo.com/windriver/versions/", }, { url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2024-22105", datePublished: "2024-07-02T00:00:00", dateReserved: "2024-01-05T00:00:00", dateUpdated: "2024-10-30T18:02:22.759Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-51776
Vulnerability from cvelistv5
Published
2024-07-02 00:00
Modified
2024-08-02 22:48
Severity ?
EPSS score ?
Summary
Improper privilege management in Jungo WinDriver before 12.1.0 allows local attackers to escalate privileges and execute arbitrary code.
References
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2023-51776", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-07-08T20:35:51.771087Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-07-08T20:35:57.576Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T22:48:11.179Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://jungo.com/windriver/versions/", }, { tags: [ "x_transferred", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { tags: [ "x_transferred", ], url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Improper privilege management in Jungo WinDriver before 12.1.0 allows local attackers to escalate privileges and execute arbitrary code.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T15:40:36.672344", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://jungo.com/windriver/versions/", }, { url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf", }, { url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2023-51776", datePublished: "2024-07-02T00:00:00", dateReserved: "2023-12-25T00:00:00", dateUpdated: "2024-08-02T22:48:11.179Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }