Missing Authentication for Critical Function (CWE-306)
The product exposes a service that is intended for local only to all network interfaces without any authentication. This vulnerability is associated with Missing Authentication for Critical Function.
The impact of this vulnerability is severe, with high potential for compromising confidentiality, integrity, and availability of the affected system. Attackers can potentially access, modify, or disrupt critical functions that were intended to be local-only, leading to unauthorized data access, system manipulation, or service disruption. The CVSS v3.1 base score is 9.8, indicating a critical severity level. The attack vector is network-based, requiring no privileges or user interaction, with low attack complexity.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. Patch details can be found at https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch
To mitigate this vulnerability: 1. Implement strong authentication mechanisms for the exposed service. 2. Use network segmentation to restrict access to the service from untrusted networks. 3. Apply the principle of least privilege, ensuring that the service only has access to necessary resources. 4. Regularly audit and monitor network interfaces and exposed services. 5. Implement firewalls or access control lists to limit incoming connections to the affected service. 6. Consider using a VPN for remote access if the service must be accessible from outside the local network.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Feedly found the first article mentioning CVE-2024-7940. See article
Feedly estimated the CVSS score as HIGH
EPSS Score was set to: 0.04% (Percentile: 9.5%)