Metrics
Affected Vendors & Products
Tue, 15 Oct 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 15 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rittal Gmbh And Co.kg
Rittal Gmbh And Co.kg iot Interface And Cmc Iii Processing Unit |
|
CPEs | cpe:2.3:a:rittal_gmbh_and_co.kg:iot_interface_and_cmc_iii_processing_unit:*:*:*:*:*:*:*:* | |
Vendors & Products |
Rittal Gmbh And Co.kg
Rittal Gmbh And Co.kg iot Interface And Cmc Iii Processing Unit |
|
Metrics |
cvssV3_1
|
Tue, 15 Oct 2024 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The device directly executes .patch firmware upgrade files on a USB stick without any prior authentication in the admin interface. This leads to an unauthenticated code execution via the firmware upgrade function. | |
Title | Missing Protection Mechanism for Alternate Hardware Interface | |
Weaknesses | CWE-1299 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2024-10-15T15:45:06.397Z
Reserved: 2024-10-07T13:39:52.543Z
Link: CVE-2024-47944

Updated: 2024-10-15T13:22:34.144Z

Status : Awaiting Analysis
Published: 2024-10-15T09:15:03.580
Modified: 2024-10-15T16:35:09.410
Link: CVE-2024-47944

No data.