Overview
- Description
- Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.
- Source
- vultures@jpcert.or.jp
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:network_edgiot_gw1500_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6ACFC28A-5D75-49D5-B4B5-D72695A7567F", "versionEndExcluding": "v02l19c01" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:network_edgiot_gw1500:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6402659A-E18E-4B42-823B-F6D5181D505E" } ], "operator": "OR" } ], "operator": "AND" } ]