First published: Wed Oct 23 2024(Updated: )
A vulnerability has been identified in InterMesh 7177 Hybrid 2.0 Subscriber (All versions < V8.2.12), InterMesh 7707 Fire Subscriber (All versions < V7.2.12 only if the IP interface is enabled (which is not the default configuration)). The web server of affected devices does not authenticate GET requests that execute specific commands (such as `ping`) on operating system level.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Siemens Intermesh 7177 Hybrid 2.0 Subscriber | <8.2.12 | |
Siemens Intermesh 7177 Hybrid 2.0 Subscriber | ||
All of | ||
Siemens Intermesh 7707 Fire Subscriber Firmware | <7.2.12 | |
Siemens Intermesh 7707 Fire Subscriber |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-47902 is considered high due to the lack of authentication for GET requests on affected devices.
To fix CVE-2024-47902, upgrade the affected devices to Siemens InterMesh 7177 Hybrid 2.0 Subscriber version 8.2.12 or later, and InterMesh 7707 Fire Subscriber version 7.2.12 or later.
CVE-2024-47902 affects all versions of InterMesh 7177 Hybrid 2.0 Subscriber prior to 8.2.12 and all versions of InterMesh 7707 Fire Subscriber prior to 7.2.12 if the IP interface is enabled.
No, the IP interface is not enabled by default in the InterMesh 7707 Fire Subscriber.
CVE-2024-47902 impacts the Siemens InterMesh 7177 Hybrid 2.0 Subscriber and the Siemens InterMesh 7707 Fire Subscriber firmware.