First published: Tue Jun 11 2024(Updated: )
A vulnerability exists in the FOXMAN-UN/UNEM in which sensitive information is stored in cleartext within a resource that might be accessible to another control sphere.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachienergy Foxman-un | =r15a | |
Hitachienergy Foxman-un | =r15b | |
Hitachienergy Foxman-un | =r16a | |
Hitachienergy Foxman-un | =r16b | |
Hitachienergy Unem | =r15a | |
Hitachienergy Unem | =r15b | |
Hitachienergy Unem | =r16a | |
Hitachienergy Unem | =r16b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28024 has been classified as a high severity vulnerability due to the exposure of sensitive information.
To remediate CVE-2024-28024, ensure that sensitive information is encrypted and not stored in cleartext.
CVE-2024-28024 affects Hitachienergy Foxman-UN versions r15a, r15b, r16a, r16b and Hitachienergy UNEM versions r15a, r15b, r16a, r16b.
CVE-2024-28024 allows sensitive information to be stored in cleartext, potentially exposing it to unauthorized access.
As a temporary measure for CVE-2024-28024, ensure access to affected resources is restricted while awaiting a patch.