CVE-2024-41156

Profile files from TRO600 series radios are extracted in plain-text and encrypted file formats. Profile files provide potential attackers valuable configuration information about the Tropos network. Profiles can only be exported by authenticated users with higher privilege of write access.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:hitachienergy:tro610_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hitachienergy:tro610:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:hitachienergy:tro620_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hitachienergy:tro620:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:hitachienergy:tro670_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hitachienergy:tro670:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-10-29 13:15

Updated : 2024-12-05 15:29


NVD link : CVE-2024-41156

Mitre link : CVE-2024-41156

CVE.ORG link : CVE-2024-41156


JSON object : View

Products Affected

hitachienergy

  • tro610
  • tro610_firmware
  • tro670
  • tro670_firmware
  • tro620_firmware
  • tro620
CWE
CWE-212

Improper Removal of Sensitive Information Before Storage or Transfer