NVD Vulnerability Detail
Search Exploit, PoC
CVE-2024-38502
Summary

An unauthenticated remote attacker may use stored XSS vulnerability to obtain information from a user or reboot the affected device once.

Publication Date Aug. 13, 2024, 10:15 p.m.
Registration Date Aug. 26, 2024, 5:03 p.m.
Last Update Aug. 22, 2024, 10:35 p.m.
CVSS3.1 : HIGH
スコア 7.1
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI)
影響の想定範囲(S) 変更あり
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:pepperl-fuchs:icdm-rx\/tcp_socketserver_firmware:*:*:*:*:*:*:*:* 11.65
execution environment
1 cpe:2.3:h:pepperl-fuchs:icdm-rx\/tcp-16db9\/rj45-rm:-:*:*:*:*:*:*:*
2 cpe:2.3:h:pepperl-fuchs:icdm-rx\/tcp-16rj45\/2rj45-pm:-:*:*:*:*:*:*:*
3 cpe:2.3:h:pepperl-fuchs:icdm-rx\/tcp-16rj45\/rj45-rm:-:*:*:*:*:*:*:*
4 cpe:2.3:h:pepperl-fuchs:icdm-rx\/tcp-2db9\/rj45-din:-:*:*:*:*:*:*:*
5 cpe:2.3:h:pepperl-fuchs:icdm-rx\/tcp-2st\/rj45-din:-:*:*:*:*:*:*:*
6 cpe:2.3:h:pepperl-fuchs:icdm-rx\/tcp-32rj45\/rj45-rm:-:*:*:*:*:*:*:*
7 cpe:2.3:h:pepperl-fuchs:icdm-rx\/tcp-4db9\/2rj45-din:-:*:*:*:*:*:*:*
8 cpe:2.3:h:pepperl-fuchs:icdm-rx\/tcp-4db9\/2rj45-pm:-:*:*:*:*:*:*:*
9 cpe:2.3:h:pepperl-fuchs:icdm-rx\/tcp-8db9\/2rj45-pm:-:*:*:*:*:*:*:*
10 cpe:2.3:h:pepperl-fuchs:icdm-rx\/tcp-db9\/rj45-din:-:*:*:*:*:*:*:*
11 cpe:2.3:h:pepperl-fuchs:icdm-rx\/tcp-db9\/rj45-pm:-:*:*:*:*:*:*:*
12 cpe:2.3:h:pepperl-fuchs:icdm-rx\/tcp-db9\/rj45-pm2:-:*:*:*:*:*:*:*
13 cpe:2.3:h:pepperl-fuchs:icdm-rx\/tcp-st\/rj45-din:-:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:pepperl-fuchs:profinet_firmware:*:*:*:*:*:*:*:* 3.4.9
execution environment
1 cpe:2.3:h:pepperl-fuchs:icdm-rx\/pn-2db9\/rj45-din:-:*:*:*:*:*:*:*
2 cpe:2.3:h:pepperl-fuchs:icdm-rx\/pn-2st\/rj45-din:-:*:*:*:*:*:*:*
3 cpe:2.3:h:pepperl-fuchs:icdm-rx\/pn-4db9\/2rj45-din:-:*:*:*:*:*:*:*
4 cpe:2.3:h:pepperl-fuchs:icdm-rx\/pn-db9\/rj45-din:-:*:*:*:*:*:*:*
5 cpe:2.3:h:pepperl-fuchs:icdm-rx\/pn-db9\/rj45-pm:-:*:*:*:*:*:*:*
6 cpe:2.3:h:pepperl-fuchs:icdm-rx\/pn-st\/rj45-din:-:*:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:o:pepperl-fuchs:profinet\/modbus_firmware:*:*:*:*:*:*:*:* 1.0.7
execution environment
1 cpe:2.3:h:pepperl-fuchs:icdm-rx\/pn1-2db9\/rj45-din:-:*:*:*:*:*:*:*
2 cpe:2.3:h:pepperl-fuchs:icdm-rx\/pn1-2st\/rj45-din:-:*:*:*:*:*:*:*
3 cpe:2.3:h:pepperl-fuchs:icdm-rx\/pn1-4db9\/2rj45-din:-:*:*:*:*:*:*:*
4 cpe:2.3:h:pepperl-fuchs:icdm-rx\/pn1-db9\/rj45-din:-:*:*:*:*:*:*:*
5 cpe:2.3:h:pepperl-fuchs:icdm-rx\/pn1-db9\/rj45-pm:-:*:*:*:*:*:*:*
6 cpe:2.3:h:pepperl-fuchs:icdm-rx\/pn1-st\/rj45-din:-:*:*:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:o:pepperl-fuchs:modbus_router_firmware:*:*:*:*:*:*:*:* 7.09
cpe:2.3:o:pepperl-fuchs:modbus_server_firmware:*:*:*:*:*:*:*:* 7.11
cpe:2.3:o:pepperl-fuchs:modbus_tcp_firmware:*:*:*:*:*:*:*:* 7.11
execution environment
1 cpe:2.3:h:pepperl-fuchs:icdm-rx\/mod-4db9\/2rj45-din:-:*:*:*:*:*:*:*
2 cpe:2.3:h:pepperl-fuchs:icdm-rx\/mod-db9\/rj45-din:-:*:*:*:*:*:*:*
3 cpe:2.3:h:pepperl-fuchs:icdm-rx\/mod-st\/rj45-din:-:*:*:*:*:*:*:*
Configuration5 or higher or less more than less than
cpe:2.3:o:pepperl-fuchs:ethernet\/ip_firmware:*:*:*:*:*:*:*:* 7.22
execution environment
1 cpe:2.3:h:pepperl-fuchs:icdm-rx\/en-2db9\/rj45-din:-:*:*:*:*:*:*:*
2 cpe:2.3:h:pepperl-fuchs:icdm-rx\/en-2st\/rj45-din:-:*:*:*:*:*:*:*
3 cpe:2.3:h:pepperl-fuchs:icdm-rx\/en-4db9\/2rj45-din:-:*:*:*:*:*:*:*
4 cpe:2.3:h:pepperl-fuchs:icdm-rx\/en-db9\/rj45-din:-:*:*:*:*:*:*:*
5 cpe:2.3:h:pepperl-fuchs:icdm-rx\/en-db9\/rj45-pm:-:*:*:*:*:*:*:*
6 cpe:2.3:h:pepperl-fuchs:icdm-rx\/en-st\/rj45-din:-:*:*:*:*:*:*:*
Configuration6 or higher or less more than less than
cpe:2.3:o:pepperl-fuchs:eip\/modbus_firmware:*:*:*:*:*:*:*:* 1.08
execution environment
1 cpe:2.3:h:pepperl-fuchs:icdm-rx\/en1-2db9\/rj45-din:-:*:*:*:*:*:*:*
2 cpe:2.3:h:pepperl-fuchs:icdm-rx\/en1-2st\/rj45-din:-:*:*:*:*:*:*:*
3 cpe:2.3:h:pepperl-fuchs:icdm-rx\/en1-4db9\/2rj45-din:-:*:*:*:*:*:*:*
4 cpe:2.3:h:pepperl-fuchs:icdm-rx\/en1-db9\/rj45-din:-:*:*:*:*:*:*:*
5 cpe:2.3:h:pepperl-fuchs:icdm-rx\/en1-db9\/rj45-pm:-:*:*:*:*:*:*:*
6 cpe:2.3:h:pepperl-fuchs:icdm-rx\/en1-st\/rj45-din:-:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
複数のピーアンドエフ製品におけるクロスサイトスクリプティングの脆弱性
Title 複数のピーアンドエフ製品におけるクロスサイトスクリプティングの脆弱性
Summary

icdm-rx/tcp socketserver ファームウェア、profinet ファームウェア、profinet/modbus ファームウェア等複数のピーアンドエフ製品には、クロスサイトスクリプティングの脆弱性が存在します。

Possible impacts 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

参考情報を参照して適切な対策を実施してください。

Publication Date Aug. 13, 2024, midnight
Registration Date Aug. 23, 2024, 2:32 p.m.
Last Update Aug. 23, 2024, 2:32 p.m.
Affected System
ピーアンドエフ
eip/modbus ファームウェア 1.08 未満
ethernet/ip ファームウェア 7.22 未満
icdm-rx/tcp socketserver ファームウェア 11.65 未満
modbus router ファームウェア 7.09 未満
modbus server ファームウェア 7.11 未満
modbus tcp ファームウェア 7.11 未満
profinet ファームウェア 3.4.9 未満
profinet/modbus ファームウェア 1.0.7 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
その他
Change Log
No Changed Details Date of change
1 [2024年08月23日]
  掲載
Aug. 23, 2024, 2:32 p.m.