First published: Thu Dec 05 2024(Updated: )
Data Validation / Data Sanitization vulnerabilities in Linux allows unvalidated and unsanitized data to be injected in an Aspect device. Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02
Credit: cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
ABB ASPECT-Enterprise | ||
Cisco Nexus Series | ||
MATRIX MATRIX Series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51550 is considered a critical vulnerability due to its potential to allow unvalidated and unsanitized data injection.
To fix CVE-2024-51550, implement proper data validation and sanitization controls on the affected systems.
CVE-2024-51550 affects ABB ASPECT - Enterprise v3.08.02, NEXUS Series v3.08.02, and MATRIX Series v3.08.02.
The implications of CVE-2024-51550 include potential unauthorized access and manipulation of sensitive data.
Currently, the best workaround for CVE-2024-51550 is to restrict access to the affected devices until a patch is released.