CVE-2024-39275

Cookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a session is closed. Forging requests with a legitimate cookie, even if the session was terminated, allows an unauthorized attacker to act with the same level of privileges of the legitimate user.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:advantech:adam-5630_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:advantech:adam-5630:-:*:*:*:*:*:*:*

History

07 Oct 2024, 15:25

Type Values Removed Values Added
CPE cpe:2.3:h:advantech:adam-5630:-:*:*:*:*:*:*:*
cpe:2.3:o:advantech:adam-5630_firmware:*:*:*:*:*:*:*:*
First Time Advantech
Advantech adam-5630 Firmware
Advantech adam-5630
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-02 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-02 - Third Party Advisory, US Government Resource
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : 8.0
v2 : unknown
v3 : 8.8

27 Sep 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-27 18:15

Updated : 2024-10-07 15:25


NVD link : CVE-2024-39275

Mitre link : CVE-2024-39275

CVE.ORG link : CVE-2024-39275


JSON object : View

Products Affected

advantech

  • adam-5630_firmware
  • adam-5630
CWE
NVD-CWE-Other CWE-539

Use of Persistent Cookies Containing Sensitive Information