This could allow an attacker to execute an on-path network (MitM) attack.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-29724 | A vulnerability has been identified in SICAM TOOLBOX II (All versions < V07.11). During establishment of a https connection to the TLS server of a managed device, the affected application doesn't check device's certificate common name against an expected value. This could allow an attacker to execute an on-path network (MitM) attack. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 21 Aug 2025 01:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:siemens:sicam_toolbox_ii:*:*:*:*:*:*:*:* |
Mon, 14 Jul 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 09 Jul 2025 02:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Jul 2025 19:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in SICAM TOOLBOX II (All versions < V07.11). During establishment of a https connection to the TLS server of a managed device, the affected application doesn't check device's certificate common name against an expected value. This could allow an attacker to execute an on-path network (MitM) attack. | |
| Weaknesses | CWE-295 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-07-08T16:11:59.998Z
Reserved: 2024-04-05T15:29:11.342Z
Link: CVE-2024-31854
Updated: 2025-07-08T14:26:54.923Z
Status : Analyzed
Published: 2025-07-08T11:15:24.180
Modified: 2025-08-20T16:17:45.790
Link: CVE-2024-31854
No data.
OpenCVE Enrichment
Updated: 2025-07-14T06:47:07Z
EUVD