FKIE_CVE-2024-38501
Vulnerability from fkie_nvd - Published: 2024-08-13 13:15 - Updated: 2024-08-22 13:34
Severity ?
Summary
An unauthenticated remote attacker may use a HTML injection vulnerability with limited length to inject malicious HTML code and gain low-privileged access on the affected device.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2024-033 | Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:icdm-rx\\/tcp_socketserver_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76F48804-5A09-45EB-9358-588C12531643",
"versionEndExcluding": "11.65",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/tcp-16db9\\/rj45-rm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74FA0423-B701-4FD9-AB55-0C9EEEE0A28F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/tcp-16rj45\\/2rj45-pm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99FF2849-0342-4E29-8976-8A69FBD19105",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/tcp-16rj45\\/rj45-rm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD7C60B0-3074-4DA5-9CAB-1D86FD345A2B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/tcp-2db9\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04558366-D4BC-4EA2-87DD-D884ADBC225E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/tcp-2st\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B14B2C3-5072-4DA1-A94C-D5DFD772CA61",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/tcp-32rj45\\/rj45-rm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31A3AC39-07B6-4638-BD37-E43FEFC7453F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/tcp-4db9\\/2rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "414C289E-538E-4958-AAA9-682920F6C3B2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/tcp-4db9\\/2rj45-pm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4966738-4A3C-4182-9D86-1B5D376EEAED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/tcp-8db9\\/2rj45-pm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "522B8CFC-FD02-4002-8518-923D93F9941B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/tcp-db9\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D01ADEB1-C000-4DAE-9470-8380D998548B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/tcp-db9\\/rj45-pm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B9732BD-A75B-4D8A-A710-491F348A6056",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/tcp-db9\\/rj45-pm2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A85AD844-2330-4128-95E9-A12330D16152",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/tcp-st\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE154902-5B25-401C-A096-013AEC156F4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:profinet_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "504996AD-D6AD-4C58-8FBC-293B72E567FC",
"versionEndExcluding": "3.4.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/pn-2db9\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E53643B1-13E5-4A89-8BE3-5FAA0E8C28C9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/pn-2st\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA5209DC-117F-46DE-85B2-DA59BDE28255",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/pn-4db9\\/2rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1051031D-9D38-43B0-B0A5-D6DA83EC32EE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/pn-db9\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE812DA2-DF93-4424-9856-FFB1A97461B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/pn-db9\\/rj45-pm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D85A19A-B02D-4A33-ABC8-4CB705946051",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/pn-st\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "429274C3-C388-43CF-8D4C-4F71C348B14E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:profinet\\/modbus_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96BC0CEB-A9B5-45BD-8AF3-73A2C5C56DDD",
"versionEndExcluding": "1.0.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/pn1-2db9\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAAC75E1-369D-4417-8A4D-4DE8A6443D9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/pn1-2st\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE3B448B-C3E5-48D2-8167-0BDEE44E5A56",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/pn1-4db9\\/2rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28BED750-59B0-4B01-8D71-5C73B875C055",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/pn1-db9\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53A6C459-94EF-47E5-B0AF-40161AC4ABBC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/pn1-db9\\/rj45-pm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40FE8D87-3C85-4749-B519-533006EAFF7D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/pn1-st\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E482103C-13D7-4BE7-AD9E-1EFE1FBDC8C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:modbus_router_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A19029DF-A3AB-4EDD-8655-E7FD8B8A2008",
"versionEndExcluding": "7.09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:pepperl-fuchs:modbus_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8A8EC37-6A6E-4DC0-9EE6-91E2CF2E6471",
"versionEndExcluding": "7.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:pepperl-fuchs:modbus_tcp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E746E0B5-1D83-4384-811B-2307F7C43369",
"versionEndExcluding": "7.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/mod-4db9\\/2rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFE4CDAC-4561-44B5-B348-0CA52935D4F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/mod-db9\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7576D41E-F76E-4DD8-A2D2-414077324B96",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/mod-st\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E444EA03-AA16-41E2-B3C6-E6FFE9283862",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:ethernet\\/ip_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0358942E-C89F-45B6-92FA-59EA192260F7",
"versionEndExcluding": "7.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/en-2db9\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D67F1B4C-96EA-4768-85CE-6DA4EB63B154",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/en-2st\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F108AD5F-2202-4C8C-896B-B1703D8DFFB8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/en-4db9\\/2rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC4D443-1860-481C-9574-5FC5106B1B0C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/en-db9\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49F3E1E2-004C-46FC-84A7-07E8AC09B96F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/en-db9\\/rj45-pm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "368CA225-66FE-4CE2-8E8D-17BDA1A2DBF9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/en-st\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1378603-4440-4C77-B890-73C9896068C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pepperl-fuchs:eip\\/modbus_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FCEE06D-1D22-4467-A544-F25E1600D4A2",
"versionEndExcluding": "1.08",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/en1-2db9\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1223BB5A-6DC0-4778-B248-E40A0FA09D5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/en1-2st\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD2CA662-6B40-40BA-9D34-043C0350F8AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/en1-4db9\\/2rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB85CB22-4936-4A02-B978-08744F08F054",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/en1-db9\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF9C895-E0FF-4EE2-9664-0F9063D9F24B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/en1-db9\\/rj45-pm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1C39534-9887-4DEF-9169-FF5B842B1A58",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:pepperl-fuchs:icdm-rx\\/en1-st\\/rj45-din:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEA4298A-DA92-4661-98BA-12580B750B4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker may use a HTML injection vulnerability with limited length to inject malicious HTML code and gain low-privileged access on the affected device."
},
{
"lang": "es",
"value": "Un atacante remoto no autenticado puede utilizar una vulnerabilidad de inyecci\u00f3n de HTML con una longitud limitada para inyectar c\u00f3digo HTML malicioso y obtener acceso con pocos privilegios en el dispositivo afectado."
}
],
"id": "CVE-2024-38501",
"lastModified": "2024-08-22T13:34:42.653",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
},
"published": "2024-08-13T13:15:12.130",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2024-033"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…