- Description
- Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.
- Source
- vultures@jpcert.or.jp
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fujitsu:network_edgiot_gw1500_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6ACFC28A-5D75-49D5-B4B5-D72695A7567F",
"versionEndExcluding": "v02l19c01"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:fujitsu:network_edgiot_gw1500:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "6402659A-E18E-4B42-823B-F6D5181D505E"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]