First published: Tue Jun 11 2024(Updated: )
An authentication bypass vulnerability exists in the FOXMAN-UN/UNEM server / API Gateway component that if exploited allows attackers without any access to interact with the services and the post-authentication attack surface.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Energy Foxman Un | =r15a | |
Hitachi Energy Foxman Un | =r15b-pc4 | |
Hitachi Energy Foxman Un | =r16a | |
Hitachi Energy Foxman Un | =r16b-pc2 | |
Hitachi Energy Unem | =r15a | |
Hitachi Energy Unem | =r15b-pc4 | |
Hitachi Energy Unem | =r15b-pc5 | |
Hitachi Energy Unem | =r16b | |
Hitachi Energy Unem | =r16b-pc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2013 is classified as a critical vulnerability due to its potential for authentication bypass.
To mitigate CVE-2024-2013, update the FOXMAN-UN and UNEM server to the latest patched versions provided by Hitachi Energy.
CVE-2024-2013 affects Foxman-UN versions r15a, r15b, r16a, and r16b, as well as Unem versions r15a, r15b, and r16b.
CVE-2024-2013 allows attackers to bypass authentication, potentially leading to unauthorized access to sensitive services.
Yes, CVE-2024-2013 is considered easy to exploit, allowing attackers to interact with services without proper authentication.