cve/2024/CVE-2024-37993.md

44 lines
4.9 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-37993](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37993)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF1140R&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF1170R&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF166C&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF185C&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF186C&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF186CI&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF188C&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF188CI&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20RF360R&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF610R%20CMIIT&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF610R%20ETSI&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF610R%20FCC&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF615R%20CMIIT&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF615R%20ETSI&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF615R%20FCC&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF650R%20ARIB&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF650R%20CMIIT&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF650R%20ETSI&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF650R%20FCC&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF680R%20ARIB&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF680R%20CMIIT&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF680R%20ETSI&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF680R%20FCC&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF685R%20ARIB&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF685R%20CMIIT&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF685R%20ETSI&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Reader%20RF685R%20FCC&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%3A%20Improper%20Access%20Control&color=brightgreen)
### Description
A vulnerability has been identified in SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0) (All versions < V4.2), SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0) (All versions < V4.2), SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0) (All versions < V4.2), SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0) (All versions < V4.2), SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0) (All versions < V4.2), SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0) (All versions < V4.2), SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0) (All versions < V4.2), SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0) (All versions < V4.2), SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0) (All versions < V4.2), SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0) (All versions < V4.2), SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0) (All versions < V4.2), SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0) (All versions < V4.2), SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0) (All versions < V4.2), SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0) (All versions < V4.2), SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0) (All versions < V4.2), SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0) (All versions < V4.2), SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0) (All versions < V4.2), SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0) (All versions < V4.2), SIMATIC RF1140R (6GT2831-6CB00) (All versions < V1.1), SIMATIC RF1170R (6GT2831-6BB00) (All versions < V1.1), SIMATIC RF166C (6GT2002-0EE20) (All versions < V2.2), SIMATIC RF185C (6GT2002-0JE10) (All versions < V2.2), SIMATIC RF186C (6GT2002-0JE20) (All versions < V2.2), SIMATIC RF186CI (6GT2002-0JE50) (All versions < V2.2), SIMATIC RF188C (6GT2002-0JE40) (All versions < V2.2), SIMATIC RF188CI (6GT2002-0JE60) (All versions < V2.2), SIMATIC RF360R (6GT2801-5BA30) (All versions < V2.2). The affected applications do not authenticated the creation of Ajax2App instances. This could allow an unauthenticated attacker to cause a denial of service condition.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds