Westermo L210-F2G

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 8.7
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Westermo
  • Equipment: L210-F2G Lynx
  • Vulnerabilities: Cleartext Transmission of Sensitive Information, Improper Control of Interaction Frequency

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could crash the device being accessed or may allow remote code execution.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of Westermo L210-F2G industrial ethernet switches are affected:

  • L210-F2G Lynx: version 4.21.0

3.2 Vulnerability Overview

3.2.1 Cleartext Transmission of Sensitive Information CWE-319

Plain text credentials and session ID can be captured with a network sniffer.

CVE-2024-37183 has been assigned to this vulnerability. A CVSS v3.1 base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).

A CVSS v4 score has also been calculated for CVE-2024-37183. A base score of 6.9 has been calculated; the CVSS vector string is (CVSS4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N).

3.2.2 Improper Control of Interaction Frequency CWE-799

An attacker may be able to cause a denial-of-service condition by sending many packets repeate

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from All CISA Advisories

Read the original article: