First published: Fri Sep 27 2024(Updated: )
Advantech ADAM-5630 has built-in commands that can be executed without authenticating the user. These commands allow for restarting the operating system, rebooting the hardware, and stopping the execution. The commands can be sent to a simple HTTP request and are executed by the device automatically, without discrimination of origin or level of privileges of the user sending the commands.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech Adam-5630 Firmware |
Advantech recommends users upgrade their ADAM-5630 devices to version 2.5.2 https://www.advantech.com/zh-tw/support/details/firmware .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39364 has a high severity rating due to its ability to execute built-in commands without authentication.
Fixing CVE-2024-39364 involves applying vendor-provided patches or updating the affected Advantech ADAM-5630 firmware to the latest version.
CVE-2024-39364 can allow unauthorized users to restart the operating system, reboot the hardware, or stop its execution, leading to potential operational disruptions.
The vulnerability CVE-2024-39364 specifically affects Advantech ADAM-5630 devices.
As of now, there is no public indication that CVE-2024-39364 is actively being exploited in the wild.