First published: Tue Oct 29 2024(Updated: )
Profile files from TRO600 series radios are extracted in plain-text and encrypted file formats. Profile files provide potential attackers valuable configuration information about the Tropos network. Profiles can only be exported by authenticated users with higher privilege of write access.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Hitachienergy Tro610 Firmware | >=9.1.0.0<9.2.0.5 | |
Hitachienergy Tro610 | ||
All of | ||
Hitachienergy Tro620 Firmware | >=9.1.0.0<9.2.0.5 | |
Hitachienergy Tro620 | ||
All of | ||
Hitachienergy Tro670 Firmware | >=9.1.0.0<9.2.0.5 | |
Hitachienergy Tro670 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41156 is classified as a medium severity vulnerability due to potential exposure of sensitive configuration information.
CVE-2024-41156 allows authenticated users with write access to export profile files that may contain valuable configuration information, which could be exploited by attackers.
To mitigate CVE-2024-41156, ensure that only trusted authenticated users have write access to profile files and regularly update the firmware to the latest version.
CVE-2024-41156 affects Hitachienergy Tro610, Tro620, and Tro670 firmware versions between 9.1.0.0 and 9.2.0.5.
The risks associated with CVE-2024-41156 include unauthorized access to network configurations and potential network compromise due to leaked sensitive information.