The debug interface on Janitza UMG 508, 509, 511, 604, and 605 devices does not require authentication, which allows remote attackers to read or write to files, or execute arbitrary JASIC code, via a session on TCP port 1239.
References
Link | Resource |
---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03 | Patch Third Party Advisory US Government Resource |
https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03 | Patch Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03 - Patch, Third Party Advisory, US Government Resource |
Information
Published : 2015-10-28 10:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-3971
Mitre link : CVE-2015-3971
CVE.ORG link : CVE-2015-3971
JSON object : View
Products Affected
janitza
- umg_511
- umg_509
- umg_604
- umg_508
- umg_605
CWE
CWE-284
Improper Access Control