Description

An unauthenticated remote attacker may use stored XSS vulnerability to obtain information from a user or reboot the affected device once.

INFO

Published Date :

2024-08-13T12:33:30.908Z

Last Modified :

2024-08-13T13:28:24.550Z

Source :

CERTVDE
AFFECTED PRODUCTS

The following products are affected by CVE-2024-38502 vulnerability.

Vendors Products
Pepperl-fuchs
  • Eip\/modbus Firmware
  • Ethernet\/ip Firmware
  • Icdm-rx\/en-2db9\/rj45-din
  • Icdm-rx\/en-2st\/rj45-din
  • Icdm-rx\/en-4db9\/2rj45-din
  • Icdm-rx\/en-db9\/rj45-din
  • Icdm-rx\/en-db9\/rj45-pm
  • Icdm-rx\/en-st\/rj45-din
  • Icdm-rx\/en1-2db9\/rj45-din
  • Icdm-rx\/en1-2st\/rj45-din
  • Icdm-rx\/en1-4db9\/2rj45-din
  • Icdm-rx\/en1-db9\/rj45-din
  • Icdm-rx\/en1-db9\/rj45-pm
  • Icdm-rx\/en1-st\/rj45-din
  • Icdm-rx\/mod-4db9\/2rj45-din
  • Icdm-rx\/mod-db9\/rj45-din
  • Icdm-rx\/mod-st\/rj45-din
  • Icdm-rx\/pn-2db9\/rj45-din
  • Icdm-rx\/pn-2st\/rj45-din
  • Icdm-rx\/pn-4db9\/2rj45-din
  • Icdm-rx\/pn-db9\/rj45-din
  • Icdm-rx\/pn-db9\/rj45-pm
  • Icdm-rx\/pn-st\/rj45-din
  • Icdm-rx\/pn1-2db9\/rj45-din
  • Icdm-rx\/pn1-2st\/rj45-din
  • Icdm-rx\/pn1-4db9\/2rj45-din
  • Icdm-rx\/pn1-db9\/rj45-din
  • Icdm-rx\/pn1-db9\/rj45-pm
  • Icdm-rx\/pn1-st\/rj45-din
  • Icdm-rx\/tcp-16db9\/rj45-rm
  • Icdm-rx\/tcp-16rj45\/2rj45-pm
  • Icdm-rx\/tcp-16rj45\/rj45-rm
  • Icdm-rx\/tcp-2db9\/rj45-din
  • Icdm-rx\/tcp-2st\/rj45-din
  • Icdm-rx\/tcp-32rj45\/rj45-rm
  • Icdm-rx\/tcp-4db9\/2rj45-din
  • Icdm-rx\/tcp-4db9\/2rj45-pm
  • Icdm-rx\/tcp-8db9\/2rj45-pm
  • Icdm-rx\/tcp-db9\/rj45-din
  • Icdm-rx\/tcp-db9\/rj45-pm
  • Icdm-rx\/tcp-db9\/rj45-pm2
  • Icdm-rx\/tcp-st\/rj45-din
  • Icdm-rx\/tcp Socketserver Firmware
  • Modbus Router Firmware
  • Modbus Server Firmware
  • Modbus Tcp Firmware
  • Profinet\/modbus Firmware
  • Profinet Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-38502.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact