First published: Tue Jun 11 2024(Updated: )
A vulnerability exists in the UNEM server / APIGateway that if exploited allows a malicious user to perform an arbitrary number of authentication attempts using different passwords, and eventually gain access to other components in the same security realm using the targeted account.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachienergy Foxman-un | =r15a | |
Hitachienergy Foxman-un | =r15b | |
Hitachienergy Foxman-un | =r16a | |
Hitachienergy Foxman-un | =r16b | |
Hitachienergy Unem | =r15a | |
Hitachienergy Unem | =r15b | |
Hitachienergy Unem | =r16a | |
Hitachienergy Unem | =r16b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28022 has been assigned a high severity rating due to the potential for unauthorized access through brute-force authentication.
To mitigate CVE-2024-28022, it is recommended to implement strong password policies and limit the number of authentication attempts.
CVE-2024-28022 affects Hitachi Energy's Foxman UN and UNEM versions r15a, r15b, r16a, and r16b.
Yes, successfully exploiting CVE-2024-28022 could allow a malicious user to gain access to additional components within the same security realm.
The primary impact of CVE-2024-28022 is the potential for unauthorized access through increased brute-force authentication attempts.