Risk | Low |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-22028 |
CWE-ID | CWE-1059 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
3R-TMC01 Hardware solutions / Firmware 3R-TMC02 Hardware solutions / Firmware 3R-TMC03 Hardware solutions / Firmware 3R-TMC04 Hardware solutions / Firmware 3R-TMC05 Hardware solutions / Firmware 3R-TMC06 Hardware solutions / Firmware |
Vendor | THREE R SOLUTION |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU85428
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-22028
CWE-ID:
CWE-1059 - Insufficient Technical Documentation
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain access to potentially sensitive information.
The vulnerability exists due to insufficient technical documentation. An authenticated attacker with physical access can gain unauthorized access to sensitive information on the system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions3R-TMC01: All versions
3R-TMC02: All versions
3R-TMC03: All versions
3R-TMC04: All versions
3R-TMC05: All versions
3R-TMC06: All versions
CPE2.3https://3rrr-btob.jp/archives/news/23624
https://jvn.jp/en/jp/JVN96240417/
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.