An attacker with access to the network where the CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could obtain legitimate credentials or steal sessions due to the fact that the device only implements the HTTP protocol. This fact prevents a secure communication channel from being established.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
01 Oct 2024, 15:46
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Circutor
Circutor q-smt Circutor q-smt Firmware |
|
CWE | NVD-CWE-Other | |
References | () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products - Third Party Advisory | |
CPE | cpe:2.3:o:circutor:q-smt_firmware:1.0.4:*:*:*:*:*:*:* cpe:2.3:h:circutor:q-smt:-:*:*:*:*:*:*:* |
20 Sep 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Sep 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-18 13:15
Updated : 2024-10-01 15:46
NVD link : CVE-2024-8890
Mitre link : CVE-2024-8890
CVE.ORG link : CVE-2024-8890
JSON object : View
Products Affected
circutor
- q-smt
- q-smt_firmware
CWE