We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-40617



Description

Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.

Reserved 2024-07-08 | Published 2024-07-17 | Updated 2024-10-29 | Assigner jpcert

Problem types

Path traversal

Product status

prior to V02L19C01
affected

References

fenics.fujitsu.com/networkservice/m2m/download/update-m.html

jvn.jp/en/jp/JVN25583987/

cve.org (CVE-2024-40617)

nvd.nist.gov (CVE-2024-40617)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-40617

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.