CVE-2024-37183

Plain text credentials and session ID can be captured with a network sniffer.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-172-03 Third Party Advisory US Government Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-172-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:westermo:l210-f2g_firmware:4.21.0:*:*:*:*:*:*:*
cpe:2.3:h:westermo:l210-f2g:-:*:*:*:*:*:*:*

History

30 Jul 2025, 18:09

Type Values Removed Values Added
CPE cpe:2.3:h:westermo:l210-f2g:-:*:*:*:*:*:*:*
cpe:2.3:o:westermo:l210-f2g_firmware:4.21.0:*:*:*:*:*:*:*
First Time Westermo l210-f2g
Westermo l210-f2g Firmware
Westermo
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-172-03 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-172-03 - Third Party Advisory, US Government Resource

21 Nov 2024, 09:23

Type Values Removed Values Added
Summary
  • (es) Las credenciales de texto sin formato y el ID de sesión se pueden capturar con un rastreador de red.
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-172-03 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-172-03 -

20 Jun 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 22:15

Updated : 2025-07-30 18:09


NVD link : CVE-2024-37183

Mitre link : CVE-2024-37183

CVE.ORG link : CVE-2024-37183


JSON object : View

Products Affected

westermo

  • l210-f2g
  • l210-f2g_firmware
CWE
CWE-319

Cleartext Transmission of Sensitive Information