First published: Thu Oct 03 2024(Updated: )
Delta Electronics DIAEnergie is vulnerable to an SQL injection in the script AM_RegReport.aspx. An unauthenticated attacker may be able to exploit this issue to obtain records contained in the targeted product.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
DIAEnergie | <=1.10.01.008 |
Delta recommends users update to DIAEnergie v1.10.01.009. Users can request this version of DIAEnergie from Delta Electronics' regional sales or agents. https://www.deltaww.com/en-US/customerService For more information on this issue, please see the Delta product cybersecurity advisory. https://www.deltaww.com/en-US/Cybersecurity_Advisory
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-43699 is critical as it allows an unauthenticated attacker to exploit SQL injection vulnerabilities.
To fix CVE-2024-43699, update to a version of Delta Electronics DIAEnergie that is above 1.10.01.008.
DIAEnergie versions up to and including 1.10.01.008 are affected by CVE-2024-43699.
CVE-2024-43699 facilitates an SQL injection attack, allowing attackers to retrieve sensitive information.
Yes, CVE-2024-43699 can be exploited remotely without authentication.