Vulnerability Description
Vulnerability in CIRCUTOR TCP2RS+ firmware version 1.3b, which could allow an attacker to modify any configuration value, even if the device has the user/password authentication option enabled, without authentication by sending packets through the UDP protocol and port 2000, deconfiguring the device and thus disabling its use. This equipment is at the end of its useful life cycle.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Circutor | Tcp2Rs\+ Firmware | 1.3b |
| Circutor | Tcp2Rs\+ | - |
Related Weaknesses (CWE)
References
- https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-Third Party Advisory
FAQ
What is CVE-2024-8889?
CVE-2024-8889 is a vulnerability with a CVSS score of 9.3 (CRITICAL). Vulnerability in CIRCUTOR TCP2RS+ firmware version 1.3b, which could allow an attacker to modify any configuration value, even if the device has the user/password authentication option enabled, withou...
How severe is CVE-2024-8889?
CVE-2024-8889 has been rated CRITICAL with a CVSS base score of 9.3/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-8889?
Check the references section above for vendor advisories and patch information. Affected products include: Circutor Tcp2Rs\+ Firmware, Circutor Tcp2Rs\+.