CVE-2024-7940

Missing Authentication for Critical Function (CWE-306)

Published: Aug 27, 2024 / Updated: 2mo ago

010
CVSS 9.8EPSS 0.04%Critical
CVE info copied to clipboard

Summary

The product exposes a service that is intended for local only to all network interfaces without any authentication. This vulnerability is associated with Missing Authentication for Critical Function.

Impact

The impact of this vulnerability is severe, with high potential for compromising confidentiality, integrity, and availability of the affected system. Attackers can potentially access, modify, or disrupt critical functions that were intended to be local-only, leading to unauthorized data access, system manipulation, or service disruption. The CVSS v3.1 base score is 9.8, indicating a critical severity level. The attack vector is network-based, requiring no privileges or user interaction, with low attack complexity.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. Patch details can be found at https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch

Mitigation

To mitigate this vulnerability: 1. Implement strong authentication mechanisms for the exposed service. 2. Use network segmentation to restrict access to the service from untrusted networks. 3. Apply the principle of least privilege, ensuring that the service only has access to necessary resources. 4. Regularly audit and monitor network interfaces and exposed services. 5. Implement firewalls or access control lists to limit incoming connections to the affected service. 6. Consider using a VPN for remote access if the service must be accessible from outside the local network.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

First Article

Feedly found the first article mentioning CVE-2024-7940. See article

Aug 27, 2024 at 1:21 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Aug 27, 2024 at 1:32 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.5%)

Aug 28, 2024 at 9:30 AM
Static CVE Timeline Graph

Affected Systems

Hitachienergy/microscada_x_sys600
+null more

Patches

publisher.hitachienergy.com
+null more

Attack Patterns

CAPEC-12: Choosing Message Identifier
+null more

News

US-CERT Vulnerability Summary for the Week of August 26, 2024
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High : vulnerabilities with a CVSS base score of 7.0–10.0 Medium : vulnerabilities with a CVSS base score of 4.0–6.9 Low : vulnerabilities with a CVSS base score of 0.0–3.9 Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links.
Vulnerability Summary for the Week of August 26, 2024
Vulnerability Summary for the Week of August 26, 2024 bjackson Sep 03, 2024 High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info Adobe--Acrobat Reader Acrobat Reader versions 127.0.2651.105 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2024-08-26 7.8 CVE-2024-41879 psirt@adobe.com aertherwide -- exiftags Buffer Overflow vulnerability in open source exiftags v.1.01 allows a local attacker to execute arbitrary code via the paresetag function. 2024-08-27 7.8 CVE-2024-42851 cve@mitre.org angeljudesuarez -- tailoring_management_system A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. This vulnerability affects unknown code of the file staffcatedit.php. The manipulation of the argument title leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. 2024-08-26 9.8 CVE-2024-8171 cna@vuldb.com cna@vuldb.com cna@vuldb.com cna@vuldb.com cna@vuldb.com angeljudesuarez -- tailoring_management_system A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical.
Update Mon Sep 2 22:50:17 UTC 2024
Update Mon Sep 2 22:50:17 UTC 2024
Hitachi reports critical flaws in its MicroSCADA X SYS600, urges patching
Hitachi Energy has reported multiple high to critical severity vulnerabilities in its MicroSCADA X SYS600 product, which is widely used for monitoring and controlling utility power systems. CVE-2024-4872 (CVSS score 9.9) : This critical vulnerability involves SQL injection due to improper validation of user queries, allowing attackers to execute unauthorized commands.
Hitachi Energy Vulnerabilities Plague SCADA Power Systems
Hitachi Energy is urging customers of its MicroSCADA X SYS600 product for monitoring and controlling utility power systems to immediately upgrade to a newly released version to mitigate multiple critical and high-severity vulnerabilities. However, to pull it off an attacker would need to have local access to a machine where a vulnerable instance of MicroSCADA X SYS600 is installed, and enable session logging, Hitachi said.
See 13 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI