First published: Wed Jul 17 2024(Updated: )
Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Fujitsu Network Edgiot GW1500 Firmware | <v02l19c01 | |
Fujitsu Network Edgiot GW1500 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40617 is classified as a medium-severity path traversal vulnerability.
To address CVE-2024-40617, it is recommended to update the Fujitsu Network Edgiot GW1500 firmware to the latest version.
CVE-2024-40617 affects the Fujitsu Network Edgiot GW1500 firmware versions below v02l19c01.
CVE-2024-40617 is a path traversal vulnerability that allows access to restricted files.
An authenticated attacker with User Class privilege can exploit CVE-2024-40617 to access sensitive information in restricted files.