Vulnerability in FOXMAN-UN/UNEM Server Could Lead to Loss of Confidentiality and Integrity
CVE-2024-28021
7.4HIGH
Summary
A vulnerability has been identified in the FOXMAN-UN and FOXMAN-UNEM servers related to the inadequate validation of certificates within their message queueing mechanisms. This shortcoming allows an attacker to potentially spoof a trusted entity, which can lead to significant risks, including unauthorized access to sensitive information and compromised data integrity. Organizations utilizing these products are encouraged to review their security posture and implement necessary safeguards to mitigate this vulnerability.
Affected Version(s)
FOXMAN-UN FOXMAN-UN R16B PC2
FOXMAN-UN FOXMAN-UN R15B PC4
UNEM UNEM R16B PC2
References
CVSS V3.1
Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database