1. EXECUTIVE SUMMARY
- CVSS v4 8.7
- ATTENTION: Exploitable remotely/low attack complexity
- Vendor: Westermo
- Equipment: L210-F2G Lynx
- Vulnerabilities: Cleartext Transmission of Sensitive Information, Improper Control of Interaction Frequency
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could crash the device being accessed or may allow remote code execution.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following versions of Westermo L210-F2G industrial ethernet switches are affected:
- L210-F2G Lynx: version 4.21.0
3.2 Vulnerability Overview
3.2.1 Cleartext Transmission of Sensitive Information CWE-319
Plain text credentials and session ID can be captured with a network sniffer.
CVE-2024-37183 has been assigned to this vulnerability. A CVSS v3.1 base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).
A CVSS v4 score has also been calculated for CVE-2024-37183. A base score of 6.9 has been calculated; the CVSS vector string is (CVSS4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N).
3.2.2 Improper Control of Interaction Frequency CWE-799
An attacker may be able to cause a denial-of-service condition by sending many packets repeate
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: