CVE-2024-39275

Cookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a session is closed. Forging requests with a legitimate cookie, even if the session was terminated, allows an unauthorized attacker to act with the same level of privileges of the legitimate user.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:advantech:adam-5630_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-5630:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-09-27 18:15

Updated : 2024-10-07 15:25


NVD link : CVE-2024-39275

Mitre link : CVE-2024-39275

CVE.ORG link : CVE-2024-39275


JSON object : View

Products Affected

advantech

  • adam-5630
  • adam-5630_firmware
CWE
CWE-539

Use of Persistent Cookies Containing Sensitive Information

NVD-CWE-Other