Published:2024/07/16  Last Updated:2024/07/16

JVN#25583987
FUJITSU Network Edgiot GW1500 vulnerable to path traversal

Overview

FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS) provided by Fujitsu Limited contains a path traversal vulnerability.

Products Affected

  • FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS) versions prior to V02L19C01
Note that the products is affected only when using it with the factory shipped initial configuration.

Description

FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS) provided by Fujitsu Limited contains a path traversal vulnerability (CWE-22).

Impact

If a logged-in attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.

Solution

Apply the Patch
Apply the patch according to the information provided by the developer.

Apply the Workaround
The following workaround may mitigate the impact of this vulnerability.

  • Change Administrator Class's password when resetting the initial configuration of the product

Vendor Status

Vendor Status Last Update Vendor Notes
Fujitsu Limited Vulnerable 2024/07/16

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Base Score: 6.5
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Comment

The analysis evaluates "Confidentiality(C)" as the primary impact where the internal file containing sensitive information is accessible, whereas treating "Integrity(I)" and "Availability(A)" as secondary impacts.

Credit

Eddy HUYNH & Jonathan PAUC from LCIE - BUREAU VERITAS CPS reported this vulnerability to Fujitsu Limited and coordinated. After the coordination was completed, Fujitsu Limited reported the case to JPCERT/CC to notify users of the solution through JVN.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2024-40617
JVN iPedia JVNDB-2024-000071