First published: Tue Jun 11 2024(Updated: )
A user/password reuse vulnerability exists in the FOXMAN-UN/UNEM application and server management. If exploited a malicious high-privileged user could use the passwords and login information through complex routines to extend access on the server and other services.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachienergy Foxman-un | =r15a | |
Hitachienergy Foxman-un | =r15b | |
Hitachienergy Foxman-un | =r16a | |
Hitachienergy Foxman-un | =r16b | |
Hitachienergy Unem | =r15a | |
Hitachienergy Unem | =r15b | |
Hitachienergy Unem | =r16a | |
Hitachienergy Unem | =r16b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28020 is classified as a high-severity vulnerability due to its potential for exploitation by high-privileged users.
To fix CVE-2024-28020, it is recommended to update the FOXMAN-UN/UNEM application to the latest version available from Hitachi Energy.
CVE-2024-28020 affects the FOXMAN-UN and UNEM applications in versions r15a, r15b, r16a, and r16b.
If exploited, CVE-2024-28020 allows an attacker to leverage user/password reuse to gain unauthorized access to the server and other connected services.
Yes, users must take action to mitigate CVE-2024-28020 by changing their passwords and applying relevant software updates.