- Description
- Profile files from TRO600 series radios are extracted in plain-text and encrypted file formats. Profile files provide potential attackers valuable configuration information about the Tropos network. Profiles can only be exported by authenticated users with higher privilege of write access.
- Source
- cybersecurity@hitachienergy.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 2.7
- Impact score
- 1.4
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
- Severity
- LOW
- Hype score
- Not currently trending
『an attacker with write access to the web UI can execute commands on the device with root privileges,』 CVE-2024-41153 CVE-2024-41156 Multiple vulnerabilities in Hitachi Energy TRO600 series products https://t.co/MYAoPtXe81
@autumn_good_35
30 Oct 2024
274 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-41156 Profile files from TRO600 series radios are extracted in plain-text and encrypted file formats. Profile files provide potential attackers valuable configuration infor… https://t.co/8RxZM0NOls
@CVEnew
29 Oct 2024
277 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hitachienergy:tro610_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D5C2D2E0-5383-44E5-B8C6-C743503A8E51",
"versionEndExcluding": "9.2.0.5",
"versionStartIncluding": "9.1.0.0"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hitachienergy:tro610:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B3A46C6E-9314-40EB-A8BE-0D3A26B5FE4C"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hitachienergy:tro620_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4BE01813-8087-4E9B-8B2B-FF813C0E9506",
"versionEndExcluding": "9.2.0.5",
"versionStartIncluding": "9.1.0.0"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hitachienergy:tro620:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "DC979E74-6316-4BED-87A6-4DC9B9747E0F"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hitachienergy:tro670_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A6A94F87-2875-46C9-8BD3-BE3EA9F71648",
"versionEndExcluding": "9.2.0.5",
"versionStartIncluding": "9.1.0.0"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hitachienergy:tro670:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "E84F6910-1D58-4AE7-94EF-797C9BD52690"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]