Vulnerabilites related to FXC Inc. - AE1021PE
CVE-2024-47397 (GCVE-0-2024-47397)
Vulnerability from cvelistv5
Published
2024-12-18 06:35
Modified
2024-12-18 14:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1390 - Weak authentication
Summary
Weak authentication issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier. If this vulnerability is exploited, the authentication may be bypassed with an undocumented specific string.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47397", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-18T14:58:36.329686Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-18T14:58:49.381Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "AE1021", "vendor": "FXC Inc.", "versions": [ { "status": "affected", "version": "firmware versions 2.0.10 and earlier" } ] }, { "product": "AE1021PE", "vendor": "FXC Inc.", "versions": [ { "status": "affected", "version": "firmware versions 2.0.10 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Weak authentication issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier. If this vulnerability is exploited, the authentication may be bypassed with an undocumented specific string." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1390", "description": "Weak authentication", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-18T06:35:16.031Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.fxc.jp/news/20241213" }, { "url": "https://jvn.jp/en/vu/JVNVU91084137/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-47397", "datePublished": "2024-12-18T06:35:16.031Z", "dateReserved": "2024-12-10T07:10:15.313Z", "dateUpdated": "2024-12-18T14:58:49.381Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-49897 (GCVE-0-2023-49897)
Vulnerability from cvelistv5
Published
2023-12-06 06:49
Modified
2025-07-30 01:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- OS command injection
Summary
An OS command injection vulnerability exists in AE1021PE firmware version 2.0.9 and earlier and AE1021 firmware version 2.0.9 and earlier. If this vulnerability is exploited, an arbitrary OS command may be executed by an attacker who can log in to the product.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:09:48.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.fxc.jp/news/20231206" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU92152057/" }, { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-355-01" }, { "tags": [ "x_transferred" ], "url": "https://www.akamai.com/blog/security-research/zero-day-vulnerability-spreading-mirai-patched" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-49897", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2023-12-20T05:00:54.981164Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2023-12-21", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-49897" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:37:10.378Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2023-12-21T00:00:00+00:00", "value": "CVE-2023-49897 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "AE1021PE", "vendor": "FXC Inc.", "versions": [ { "status": "affected", "version": "2.0.9 and earlier" } ] }, { "product": "AE1021", "vendor": "FXC Inc.", "versions": [ { "status": "affected", "version": "2.0.9 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "An OS command injection vulnerability exists in AE1021PE firmware version 2.0.9 and earlier and AE1021 firmware version 2.0.9 and earlier. If this vulnerability is exploited, an arbitrary OS command may be executed by an attacker who can log in to the product." } ], "problemTypes": [ { "descriptions": [ { "description": "OS command injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-22T04:06:04.193Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.fxc.jp/news/20231206" }, { "url": "https://jvn.jp/en/vu/JVNVU92152057/" }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-355-01" }, { "url": "https://www.akamai.com/blog/security-research/zero-day-vulnerability-spreading-mirai-patched" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-49897", "datePublished": "2023-12-06T06:49:41.752Z", "dateReserved": "2023-12-01T02:30:49.222Z", "dateUpdated": "2025-07-30T01:37:10.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-54457 (GCVE-0-2024-54457)
Vulnerability from cvelistv5
Published
2024-12-18 06:37
Modified
2024-12-18 15:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1242 - Inclusion of undocumented features or chicken bits
Summary
Inclusion of undocumented features or chicken bits issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier, which may allow a logged-in user to enable telnet service.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-54457", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-18T15:25:57.981597Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-18T15:28:14.673Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "AE1021", "vendor": "FXC Inc.", "versions": [ { "status": "affected", "version": "firmware versions 2.0.10 and earlier" } ] }, { "product": "AE1021PE", "vendor": "FXC Inc.", "versions": [ { "status": "affected", "version": "firmware versions 2.0.10 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Inclusion of undocumented features or chicken bits issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier, which may allow a logged-in user to enable telnet service." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1242", "description": "Inclusion of undocumented features or chicken bits", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-18T06:37:11.912Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.fxc.jp/news/20241213" }, { "url": "https://jvn.jp/en/vu/JVNVU91084137/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-54457", "datePublished": "2024-12-18T06:37:11.912Z", "dateReserved": "2024-12-10T07:10:13.893Z", "dateUpdated": "2024-12-18T15:28:14.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-53688 (GCVE-0-2024-53688)
Vulnerability from cvelistv5
Published
2024-12-18 06:36
Modified
2024-12-18 14:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper neutralization of special elements used in an OS command ('OS Command Injection')
Summary
Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier, which may allow a logged-in user to execute an arbitrary OS command using a crafted HTTP request.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-53688", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-18T14:50:11.060809Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-18T14:50:36.146Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "AE1021", "vendor": "FXC Inc.", "versions": [ { "status": "affected", "version": "firmware versions 2.0.10 and earlier" } ] }, { "product": "AE1021PE", "vendor": "FXC Inc.", "versions": [ { "status": "affected", "version": "firmware versions 2.0.10 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper neutralization of special elements used in an OS command (\u0027OS Command Injection\u0027) issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier, which may allow a logged-in user to execute an arbitrary OS command using a crafted HTTP request." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Improper neutralization of special elements used in an OS command (\u0027OS Command Injection\u0027)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-18T06:36:30.180Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.fxc.jp/news/20241213" }, { "url": "https://jvn.jp/en/vu/JVNVU91084137/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-53688", "datePublished": "2024-12-18T06:36:30.180Z", "dateReserved": "2024-12-10T07:10:12.976Z", "dateUpdated": "2024-12-18T14:50:36.146Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }