Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 10 Sep 2024 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Fujitsu
         Fujitsu network Edgiot Gw1500 Fujitsu network Edgiot Gw1500 Firmware  | 
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:h:fujitsu:network_edgiot_gw1500:-:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:network_edgiot_gw1500_firmware:*:*:*:*:*:*:*:*  | 
|
| Vendors & Products | 
        
        Fujitsu
         Fujitsu network Edgiot Gw1500 Fujitsu network Edgiot Gw1500 Firmware  | 
|
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: jpcert
Published: 2024-07-17T08:44:44.939Z
Updated: 2024-10-29T20:04:48.758Z
Reserved: 2024-07-08T00:59:01.182Z
Link: CVE-2024-40617
Updated: 2024-08-02T04:33:12.034Z
Status : Modified
Published: 2024-07-17T09:15:03.163
Modified: 2024-11-21T09:31:22.627
Link: CVE-2024-40617
No data.