This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.
References
Configurations
No configuration.
History
No history.
Information
Published : 2024-03-14 03:15
Updated : 2024-03-14 12:52
NVD link : CVE-2024-1223
Mitre link : CVE-2024-1223
CVE.ORG link : CVE-2024-1223
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor