First published: Tue Oct 29 2024(Updated: )
Command injection vulnerability in the Edge Computing UI for the TRO600 series radios that allows for the execution of arbitrary system commands. If exploited, an attacker with write access to the web UI can execute commands on the device with root privileges, far more extensive than what the write privilege intends.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Hitachienergy Tro610 Firmware | >=9.1.0.0<9.2.0.5 | |
Hitachienergy Tro610 | ||
All of | ||
Hitachienergy Tro620 Firmware | >=9.1.0.0<9.2.0.5 | |
Hitachienergy Tro620 | ||
All of | ||
Hitachienergy Tro670 Firmware | >=9.1.0.0<9.2.0.5 | |
Hitachienergy Tro670 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41153 is considered a high-severity vulnerability due to the potential for unauthorized command execution with root privileges.
To remediate CVE-2024-41153, update the firmware of the affected Hitachi Energy TRO600 series radios to a version higher than 9.2.0.5.
CVE-2024-41153 affects the Hitachienergy TRO610, TRO620, and TRO670 series radios running specific firmware versions.
An attacker with write access to the Edge Computing UI of the affected devices can exploit CVE-2024-41153.
CVE-2024-41153 is a command injection vulnerability that allows the execution of arbitrary system commands.