2024-04-19 13:00:33 +00:00
{
2024-08-27 13:00:33 +00:00
"data_version" : "4.0" ,
2024-04-19 13:00:33 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2024-3980" ,
2024-08-27 13:00:33 +00:00
"ASSIGNER" : "cybersecurity@hitachienergy.com" ,
"STATE" : "PUBLIC"
2024-04-19 13:00:33 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2024-10-29 14:00:38 +00:00
"value" : "The MicroSCADA Pro/X SYS600 product allows an authenticated user input to control or influence paths or file names\nthat are used in filesystem operations. If exploited the vulnerability allows the attacker to access or modify system files or\nother files that are critical to the application."
2024-08-27 13:00:33 +00:00
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
2024-10-29 14:00:38 +00:00
"value" : "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" ,
"cweId" : "CWE-22"
2024-08-27 13:00:33 +00:00
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Hitachi Energy" ,
"product" : {
"product_data" : [
{
2024-10-29 14:00:38 +00:00
"product_name" : "MicroSCADA X SYS600" ,
2024-08-27 13:00:33 +00:00
"version" : {
"version_data" : [
{
"version_affected" : "<=" ,
"version_name" : "10.0" ,
"version_value" : "10.5"
}
]
}
2024-10-29 14:00:38 +00:00
} ,
{
"product_name" : "MicroSCADA Pro SYS600" ,
"version" : {
"version_data" : [
{
"version_affected" : "<=" ,
"version_name" : "9.4 FP2 HF1" ,
"version_value" : "9.4 FP2 HF5"
} ,
{
"version_affected" : "=" ,
"version_value" : "9.4 FP1"
}
]
}
2024-08-27 13:00:33 +00:00
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch" ,
"refsource" : "MISC" ,
"name" : "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch"
}
]
} ,
"generator" : {
"engine" : "Vulnogram 0.2.0"
} ,
"source" : {
"discovery" : "UNKNOWN"
} ,
"impact" : {
"cvss" : [
{
"attackComplexity" : "LOW" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.9 ,
"baseSeverity" : "CRITICAL" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"scope" : "CHANGED" ,
"userInteraction" : "NONE" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" ,
"version" : "3.1"
2024-10-29 14:00:38 +00:00
} ,
{
"attackComplexity" : "LOW" ,
"attackVector" : "LOCAL" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"scope" : "CHANGED" ,
"userInteraction" : "NONE" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" ,
"version" : "3.1"
2024-04-19 13:00:33 +00:00
}
]
}
}