Description

An unauthenticated remote attacker may use a HTML injection vulnerability with limited length to inject malicious HTML code and gain low-privileged access on the affected device.

INFO

Published Date :

2024-08-13T12:33:00.703Z

Last Modified :

2024-08-13T13:31:52.009Z

Source :

CERTVDE
AFFECTED PRODUCTS

The following products are affected by CVE-2024-38501 vulnerability.

Vendors Products
Pepperl-fuchs
  • Eip\/modbus Firmware
  • Ethernet\/ip Firmware
  • Icdm-rx\/en-2db9\/rj45-din
  • Icdm-rx\/en-2st\/rj45-din
  • Icdm-rx\/en-4db9\/2rj45-din
  • Icdm-rx\/en-db9\/rj45-din
  • Icdm-rx\/en-db9\/rj45-pm
  • Icdm-rx\/en-st\/rj45-din
  • Icdm-rx\/en1-2db9\/rj45-din
  • Icdm-rx\/en1-2st\/rj45-din
  • Icdm-rx\/en1-4db9\/2rj45-din
  • Icdm-rx\/en1-db9\/rj45-din
  • Icdm-rx\/en1-db9\/rj45-pm
  • Icdm-rx\/en1-st\/rj45-din
  • Icdm-rx\/mod-4db9\/2rj45-din
  • Icdm-rx\/mod-db9\/rj45-din
  • Icdm-rx\/mod-st\/rj45-din
  • Icdm-rx\/pn-2db9\/rj45-din
  • Icdm-rx\/pn-2st\/rj45-din
  • Icdm-rx\/pn-4db9\/2rj45-din
  • Icdm-rx\/pn-db9\/rj45-din
  • Icdm-rx\/pn-db9\/rj45-pm
  • Icdm-rx\/pn-st\/rj45-din
  • Icdm-rx\/pn1-2db9\/rj45-din
  • Icdm-rx\/pn1-2st\/rj45-din
  • Icdm-rx\/pn1-4db9\/2rj45-din
  • Icdm-rx\/pn1-db9\/rj45-din
  • Icdm-rx\/pn1-db9\/rj45-pm
  • Icdm-rx\/pn1-st\/rj45-din
  • Icdm-rx\/tcp-16db9\/rj45-rm
  • Icdm-rx\/tcp-16rj45\/2rj45-pm
  • Icdm-rx\/tcp-16rj45\/rj45-rm
  • Icdm-rx\/tcp-2db9\/rj45-din
  • Icdm-rx\/tcp-2st\/rj45-din
  • Icdm-rx\/tcp-32rj45\/rj45-rm
  • Icdm-rx\/tcp-4db9\/2rj45-din
  • Icdm-rx\/tcp-4db9\/2rj45-pm
  • Icdm-rx\/tcp-8db9\/2rj45-pm
  • Icdm-rx\/tcp-db9\/rj45-din
  • Icdm-rx\/tcp-db9\/rj45-pm
  • Icdm-rx\/tcp-db9\/rj45-pm2
  • Icdm-rx\/tcp-st\/rj45-din
  • Icdm-rx\/tcp Socketserver Firmware
  • Modbus Router Firmware
  • Modbus Server Firmware
  • Modbus Tcp Firmware
  • Profinet\/modbus Firmware
  • Profinet Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-38501.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact