{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T01:25:11.764","vulnerabilities":[{"cve":{"id":"CVE-2024-50375","sourceIdentifier":"prodsec@nozominetworks.com","published":"2024-11-26T11:22:07.867","lastModified":"2026-01-23T18:09:09.490","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A CWE-306 \"Missing Authentication for Critical Function\" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default \"edgserver\" service enabled on the access point."},{"lang":"es","value":"Se descubrió una vulnerabilidad CWE-306 \"Falta de autenticación para función crítica\" que afecta a los siguientes dispositivos fabricados por Advantech: EKI-6333AC-2G (&lt;= 1.6.3), EKI-6333AC-2GD (&lt;= v1.6.3) y EKI-6333AC-1GPO (&lt;= v1.2.1). La vulnerabilidad puede ser explotada por usuarios remotos no autenticados capaces de interactuar con el servicio \"edgserver\" predeterminado habilitado en el punto de acceso."}],"metrics":{"cvssMetricV31":[{"source":"prodsec@nozominetworks.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"prodsec@nozominetworks.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:advantech:eki-6333ac-2g_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.6.5","matchCriteriaId":"B5E027C8-2521-45FC-BABB-4A6E3341F883"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:advantech:eki-6333ac-2g:-:*:*:*:*:*:*:*","matchCriteriaId":"B3B63DF4-0184-4108-B48B-D31179104701"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:advantech:eki-6333ac-2gd_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.6.5","matchCriteriaId":"447F8AEB-2C7C-411A-893C-11C2F7588C82"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:advantech:eki-6333ac-2gd:-:*:*:*:*:*:*:*","matchCriteriaId":"02F70DBA-2D4C-4407-885D-71887A1A7979"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:advantech:eki-6333ac-1gpo_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.2","matchCriteriaId":"828B9D05-0064-4690-A624-D3BF659BD316"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:advantech:eki-6333ac-1gpo:-:*:*:*:*:*:*:*","matchCriteriaId":"D2A73A2B-9FD5-4971-8FFF-1BA14BCCB37B"}]}]}],"references":[{"url":"https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-50375","source":"prodsec@nozominetworks.com","tags":["Third Party Advisory"]}]}}]}