First published: Tue Dec 18 2018(Updated: )
The product M2M ETHERNET (FW Versions 2.22 and prior, ETH-FW Versions 1.01 and prior) is vulnerable in that an attacker can upload a malicious language file by bypassing the user authentication mechanism.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Abb Eth-fw Firmware | <=1.01 | |
Abb Fw Firmware | <=2.22 | |
Abb M2M Ethernet |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17926 has a high severity level due to the potential for unauthorized file uploads and subsequent remote code execution.
To fix CVE-2018-17926, upgrade the M2M ETHERNET firmware to version 2.23 or later and the ETH-FW firmware to version 1.02 or later.
CVE-2018-17926 affects the M2M ETHERNET products using firmware versions 2.22 and prior, as well as ETH-FW firmware versions 1.01 and prior.
An attacker can exploit CVE-2018-17926 to bypass user authentication and upload malicious files, potentially leading to system compromise.
Currently, there are no known workarounds for CVE-2018-17926 aside from applying the recommended firmware updates.