CVE-2018-17926

The product M2M ETHERNET (FW Versions 2.22 and prior, ETH-FW Versions 1.01 and prior) is vulnerable in that an attacker can upload a malicious language file by bypassing the user authentication mechanism.
References
Link Resource
http://www.securityfocus.com/bid/106243 Third Party Advisory VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-18-352-07 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/106243 Third Party Advisory VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-18-352-07 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:abb:eth-fw_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:abb:fw_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:m2m_ethernet:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:55

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/106243 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/106243 - Third Party Advisory, VDB Entry
References () https://ics-cert.us-cert.gov/advisories/ICSA-18-352-07 - Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-18-352-07 - Third Party Advisory, US Government Resource

Information

Published : 2019-01-31 17:29

Updated : 2024-11-21 03:55


NVD link : CVE-2018-17926

Mitre link : CVE-2018-17926

CVE.ORG link : CVE-2018-17926


JSON object : View

Products Affected

abb

  • fw_firmware
  • m2m_ethernet
  • eth-fw_firmware
CWE
CWE-287

Improper Authentication