Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.
References
Link | Resource |
---|---|
https://fenics.fujitsu.com/networkservice/m2m/download/update-m.html | Permissions Required |
https://jvn.jp/en/jp/JVN25583987/ | Third Party Advisory |
https://fenics.fujitsu.com/networkservice/m2m/download/update-m.html | Permissions Required |
https://jvn.jp/en/jp/JVN25583987/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2024-07-17 09:15
Updated : 2024-11-21 09:31
NVD link : CVE-2024-40617
Mitre link : CVE-2024-40617
CVE.ORG link : CVE-2024-40617
JSON object : View
Products Affected
fujitsu
- network_edgiot_gw1500
- network_edgiot_gw1500_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')