Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-24782
Analyzed
More InfoOfficial Page
Source-info@cert.vde.com
View Known Exploited Vulnerability (KEV) details
Published At-13 Feb, 2024 | 14:15
Updated At-18 Oct, 2024 | 19:01

An unauthenticated attacker can send a ping request from one network to another through an error in the origin verification even though the ports are separated by VLAN.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.3MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CPE Matches

hima
hima
>>f30_03x_yy_\(com\)_firmware>>Versions up to 24.14(inclusive)
cpe:2.3:o:hima:f30_03x_yy_\(com\)_firmware:*:*:*:*:*:*:*:*
hima
hima
>>f30_03x_yy_\(com\)>>-
cpe:2.3:h:hima:f30_03x_yy_\(com\):-:*:*:*:*:*:*:*
hima
hima
>>f30_03x_yy_\(cpu\)_firmware>>Versions up to 18.6(inclusive)
cpe:2.3:o:hima:f30_03x_yy_\(cpu\)_firmware:*:*:*:*:*:*:*:*
hima
hima
>>f30_03x_\(cpu\)_yy>>-
cpe:2.3:h:hima:f30_03x_\(cpu\)_yy:-:*:*:*:*:*:*:*
hima
hima
>>f35_03x_yy_\(com\)_firmware>>Versions up to 24.14(inclusive)
cpe:2.3:o:hima:f35_03x_yy_\(com\)_firmware:*:*:*:*:*:*:*:*
hima
hima
>>f35_03x_yy_\(com\)_>>-
cpe:2.3:h:hima:f35_03x_yy_\(com\)_:-:*:*:*:*:*:*:*
hima
hima
>>f35_03x_yy_\(cpu\)_firmware>>Versions up to 18.6(inclusive)
cpe:2.3:o:hima:f35_03x_yy_\(cpu\)_firmware:*:*:*:*:*:*:*:*
hima
hima
>>f35_03x_yy_\(cpu\)>>-
cpe:2.3:h:hima:f35_03x_yy_\(cpu\):-:*:*:*:*:*:*:*
hima
hima
>>f60_cpu_03x_yy_\(com\)_firmware>>Versions up to 24.14(inclusive)
cpe:2.3:o:hima:f60_cpu_03x_yy_\(com\)_firmware:*:*:*:*:*:*:*:*
hima
hima
>>f60_cpu_03x_yy_\(com\)>>-
cpe:2.3:h:hima:f60_cpu_03x_yy_\(com\):-:*:*:*:*:*:*:*
hima
hima
>>f60_cpu_03x_yy_\(cpu\)_firmware>>Versions up to 18.6(inclusive)
cpe:2.3:o:hima:f60_cpu_03x_yy_\(cpu\)_firmware:*:*:*:*:*:*:*:*
hima
hima
>>f60_cpu_03x_yy_\(cpu\)>>-
cpe:2.3:h:hima:f60_cpu_03x_yy_\(cpu\):-:*:*:*:*:*:*:*
hima
hima
>>f-com_01_firmware>>Versions up to 14.12(inclusive)
cpe:2.3:o:hima:f-com_01_firmware:*:*:*:*:*:*:*:*
hima
hima
>>f-com_01>>-
cpe:2.3:h:hima:f-com_01:-:*:*:*:*:*:*:*
hima
hima
>>f-cpu_01_firmware>>Versions up to 14.16(inclusive)
cpe:2.3:o:hima:f-cpu_01_firmware:*:*:*:*:*:*:*:*
hima
hima
>>f-cpu_01>>-
cpe:2.3:h:hima:f-cpu_01:-:*:*:*:*:*:*:*
hima
hima
>>x-com_01_e_yy_firmware>>Versions up to 15.14(inclusive)
cpe:2.3:o:hima:x-com_01_e_yy_firmware:*:*:*:*:*:*:*:*
hima
hima
>>x-com_01_e_yy>>-
cpe:2.3:h:hima:x-com_01_e_yy:-:*:*:*:*:*:*:*
hima
hima
>>x-com_01_yy_firmware>>Versions up to 14.12(inclusive)
cpe:2.3:o:hima:x-com_01_yy_firmware:*:*:*:*:*:*:*:*
hima
hima
>>x-com_01_yy>>-
cpe:2.3:h:hima:x-com_01_yy:-:*:*:*:*:*:*:*
hima
hima
>>x-cpu_01_firmware>>Versions up to 14.16(inclusive)
cpe:2.3:o:hima:x-cpu_01_firmware:*:*:*:*:*:*:*:*
hima
hima
>>x-cpu_01>>-
cpe:2.3:h:hima:x-cpu_01:-:*:*:*:*:*:*:*
hima
hima
>>x-cpu_31_firmware>>Versions up to 14.16(inclusive)
cpe:2.3:o:hima:x-cpu_31_firmware:*:*:*:*:*:*:*:*
hima
hima
>>x-cpu_31>>-
cpe:2.3:h:hima:x-cpu_31:-:*:*:*:*:*:*:*
hima
hima
>>x-sb_01_firmware>>Versions up to 7.54(inclusive)
cpe:2.3:o:hima:x-sb_01_firmware:*:*:*:*:*:*:*:*
hima
hima
>>x-sb_01>>-
cpe:2.3:h:hima:x-sb_01:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-346Primaryinfo@cert.vde.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://cert.vde.com/en/advisories/VDE-2024-013info@cert.vde.com
Mitigation
Third Party Advisory
Change History
0Changes found

Details not found