CVE-2024-25552

A local attacker can gain administrative privileges by inserting an executable file in the path of the affected product.
CVSS

No CVSS.

References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wut:com_port_redirector_legacy:*:*:*:*:*:*:*:*
cpe:2.3:a:wut:com_port_redirector_plug_\&_play:*:*:*:*:*:*:*:*
cpe:2.3:a:wut:opc_server:*:*:*:*:*:*:*:*

History

04 Mar 2025, 12:25

Type Values Removed Values Added
CPE cpe:2.3:a:wut:com_port_redirector_legacy:*:*:*:*:*:*:*:*
cpe:2.3:a:wut:opc_server:*:*:*:*:*:*:*:*
cpe:2.3:a:wut:com_port_redirector_plug_\&_play:*:*:*:*:*:*:*:*
References () https://cert.vde.com/en/advisories/VDE-2024-018 - () https://cert.vde.com/en/advisories/VDE-2024-018 - Third Party Advisory
First Time Wut com Port Redirector Legacy
Wut
Wut com Port Redirector Plug \& Play
Wut opc Server
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : unknown

01 Mar 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-01 08:15

Updated : 2025-03-04 12:25


NVD link : CVE-2024-25552

Mitre link : CVE-2024-25552


JSON object : View

Products Affected

wut

  • opc_server
  • com_port_redirector_legacy
  • com_port_redirector_plug_\&_play
CWE

No CWE.