First published: Tue Jun 11 2024(Updated: )
vulnerability exists in the FOXMAN-UN/UNEM server / API Gateway that if exploited an attacker could use to allow unintended commands or code to be executed on the UNEM server allowing sensitive data to be read or modified or could cause other unintended behavior
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachienergy Foxman-un | =r15a | |
Hitachienergy Foxman-un | =r15b-pc4 | |
Hitachienergy Foxman-un | =r16a | |
Hitachienergy Foxman-un | =r16b-pc2 | |
Hitachienergy Unem | =r15a | |
Hitachienergy Unem | =r15b-pc4 | |
Hitachienergy Unem | =r15b-pc5 | |
Hitachienergy Unem | =r16a | |
Hitachienergy Unem | =r16b-pc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2012 has a critical severity level due to its potential for unauthorized command execution.
To fix CVE-2024-2012, it is recommended to apply the latest security patches provided by Hitachi Energy.
CVE-2024-2012 affects Hitachi Energy Foxman-UN and UNEM versions r15a, r15b, r16a, and r16b.
Exploiting CVE-2024-2012 could allow attackers to read or modify sensitive data and execute unintended commands.
As of now, there have been no confirmed reports of active exploitation of CVE-2024-2012 in the wild.