CRITICAL · 9.3

CVE-2024-8889

Vulnerability in CIRCUTOR TCP2RS+ firmware version 1.3b, which could allow an attacker to modify any configuration value, even if the device has the user/password authentication option enabled, withou...

Vulnerability Description

Vulnerability in CIRCUTOR TCP2RS+ firmware version 1.3b, which could allow an attacker to modify any configuration value, even if the device has the user/password authentication option enabled, without authentication by sending packets through the UDP protocol and port 2000, deconfiguring the device and thus disabling its use. This equipment is at the end of its useful life cycle.

CVSS Score

9.3

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
NONE
Integrity
LOW
Availability
HIGH

Affected Products

VendorProductVersions
CircutorTcp2Rs\+ Firmware1.3b
CircutorTcp2Rs\+-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2024-8889?

CVE-2024-8889 is a vulnerability with a CVSS score of 9.3 (CRITICAL). Vulnerability in CIRCUTOR TCP2RS+ firmware version 1.3b, which could allow an attacker to modify any configuration value, even if the device has the user/password authentication option enabled, withou...

How severe is CVE-2024-8889?

CVE-2024-8889 has been rated CRITICAL with a CVSS base score of 9.3/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2024-8889?

Check the references section above for vendor advisories and patch information. Affected products include: Circutor Tcp2Rs\+ Firmware, Circutor Tcp2Rs\+.