First published: Wed Jul 10 2024(Updated: )
An unauthenticated remote attacker can manipulate the device via Telnet, stop processes, read, delete and change data.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Pepperl+Fuchs OIT700-F113-B12-CB | <=2.11.0 | |
Pepperl+Fuchs OIT700-F113-B12-CB | ||
All of | ||
Pepperl+Fuchs OIT500-F113-B12-CB | <=2.11.0 | |
Pepperl+Fuchs OIT500-F113-B12-CB | ||
All of | ||
Pepperl+Fuchs OIT200-F113-B12-CB | <=2.11.0 | |
Pepperl+Fuchs OIT200-F113-B12-CB | ||
All of | ||
Pepperl-Fuchs OIT1500-F113-B12-CB Firmware | <=2.11.0 | |
Pepperl-Fuchs OIT1500-F113-B12-CB Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6422 is classified as a critical vulnerability due to its potential for unauthenticated remote exploitation.
To fix CVE-2024-6422, update the affected Pepperl+Fuchs OIT firmware to version 2.12.0 or higher.
CVE-2024-6422 affects multiple Pepperl+Fuchs firmware versions up to 2.11.0 for OIT700, OIT500, OIT200, and OIT1500 models.
Yes, CVE-2024-6422 can be exploited remotely without authentication through the Telnet interface.
An attacker can stop processes, read, delete, or modify data on the affected devices using CVE-2024-6422.