CVE-2024-41156

Profile files from TRO600 series radios are extracted in plain-text and encrypted file formats. Profile files provide potential attackers valuable configuration information about the Tropos network. Profiles can only be exported by authenticated users with higher privilege of write access.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:hitachienergy:tro610_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hitachienergy:tro610:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:hitachienergy:tro620_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hitachienergy:tro620:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:hitachienergy:tro670_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hitachienergy:tro670:-:*:*:*:*:*:*:*

History

04 Dec 2024, 11:30

Type Values Removed Values Added
Summary (en) Profile files from TRO600 series radios are extracted in plain-text and encrypted file formats. Profile files provide potential attackers valuable configuration information about the Tropos network. Profiles can only be exported by authenticated users with write access. (en) Profile files from TRO600 series radios are extracted in plain-text and encrypted file formats. Profile files provide potential attackers valuable configuration information about the Tropos network. Profiles can only be exported by authenticated users with higher privilege of write access.
CVSS v2 : unknown
v3 : 4.3
v2 : unknown
v3 : 2.7

31 Oct 2024, 14:49

Type Values Removed Values Added
References () https://publisher.hitachienergy.com/preview?DocumentID=8DBD000147&LanguageCode=en&DocumentPartId=&Action=launch - () https://publisher.hitachienergy.com/preview?DocumentID=8DBD000147&LanguageCode=en&DocumentPartId=&Action=launch - Vendor Advisory
First Time Hitachienergy tro670
Hitachienergy tro620 Firmware
Hitachienergy
Hitachienergy tro610
Hitachienergy tro620
Hitachienergy tro670 Firmware
Hitachienergy tro610 Firmware
CPE cpe:2.3:h:hitachienergy:tro610:-:*:*:*:*:*:*:*
cpe:2.3:o:hitachienergy:tro620_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hitachienergy:tro670:-:*:*:*:*:*:*:*
cpe:2.3:o:hitachienergy:tro610_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:hitachienergy:tro670_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hitachienergy:tro620:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 2.7
v2 : unknown
v3 : 4.3
Summary
  • (es) Los archivos de perfil de las radios de la serie TRO600 se extraen en formato de texto plano y en formato de archivo cifrado. Los archivos de perfil proporcionan a los posibles atacantes información valiosa sobre la configuración de la red Tropos. Los perfiles solo pueden ser exportados por usuarios autenticados con acceso de escritura.

29 Oct 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-29 13:15

Updated : 2024-12-05 15:29


NVD link : CVE-2024-41156

Mitre link : CVE-2024-41156

CVE.ORG link : CVE-2024-41156


JSON object : View

Products Affected

hitachienergy

  • tro670_firmware
  • tro620_firmware
  • tro610_firmware
  • tro670
  • tro620
  • tro610
CWE
CWE-212

Improper Removal of Sensitive Information Before Storage or Transfer