First published: Tue Jun 11 2024(Updated: )
A vulnerability exists in the FOXMAN-UN/UNEM server that affects the message queueing mechanism’s certificate validation. If exploited an attacker could spoof a trusted entity causing a loss of confidentiality and integrity.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Energy Foxman Un | =r15b-pc4 | |
Hitachi Energy Foxman Un | =r16b-pc2 | |
Hitachi Energy Foxman Un | =r15a | |
Hitachi Energy Foxman Un | =r16a | |
Hitachi Energy Unem | =r15a | |
Hitachi Energy Unem | =r15b-pc4 | |
Hitachi Energy Unem | =r16a | |
Hitachi Energy Unem | =r16b-pc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28021 has a high severity rating due to the potential for confidentiality and integrity loss when exploited.
To fix CVE-2024-28021, apply the latest patches provided by Hitachi Energy for affected versions of FOXMAN-UN and UNEM software.
CVE-2024-28021 affects FOXMAN-UN versions r15b-pc4 and r16b-pc2, and UNEM versions r15a, r15b-pc4, r16a, and r16b-pc2.
CVE-2024-28021 can be exploited to spoof a trusted entity, compromising the system’s message queueing mechanism.
Currently, no official workarounds are provided for CVE-2024-28021, and users are advised to apply patches as soon as they become available.