CVE-2024-39275

Cookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a session is closed. Forging requests with a legitimate cookie, even if the session was terminated, allows an unauthorized attacker to act with the same level of privileges of the legitimate user.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:advantech:adam-5630_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-5630:-:*:*:*:*:*:*:*

History

07 Oct 2024, 15:25

Type Values Removed Values Added
CWE NVD-CWE-Other
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-02 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-02 - Third Party Advisory, US Government Resource
CVSS v2 : unknown
v3 : 8.0
v2 : unknown
v3 : 8.8
First Time Advantech adam-5630
Advantech
Advantech adam-5630 Firmware
CPE cpe:2.3:o:advantech:adam-5630_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-5630:-:*:*:*:*:*:*:*

30 Sep 2024, 12:45

Type Values Removed Values Added
Summary
  • (es) Las cookies de los usuarios autenticados de Advantech ADAM-5630 permanecen como cookies válidas activas cuando se cierra una sesión. Falsificar solicitudes con una cookie legítima, incluso si se terminó la sesión, permite que un atacante no autorizado actúe con el mismo nivel de privilegios del usuario legítimo.

27 Sep 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-27 18:15

Updated : 2024-10-07 15:25


NVD link : CVE-2024-39275

Mitre link : CVE-2024-39275

CVE.ORG link : CVE-2024-39275


JSON object : View

Products Affected

advantech

  • adam-5630_firmware
  • adam-5630
CWE
NVD-CWE-Other CWE-539

Use of Persistent Cookies Containing Sensitive Information