SARA / Free Tools / CVE / CVE-2024-3016

CVE-2024-3016 — NEC Platforms DT900 and DT900S Series 5

NEC Platforms DT900 and DT900S Series 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20 allows an attacker to access a non-documented the system settings to change settings via local network with unauthenticated user.

CVSS
EPSS
40.00% (top 39.90%)
CWE
CWE-912
Published
2024-05-09T06:32:39.145Z
Last modified
2024-08-22T15:09:05.064Z
CVSS vector

01What is this vulnerability?

NEC Platforms DT900 and DT900S Series 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20 allows an attacker to access a non-documented the system settings to change settings via local network with unauthenticated user.

02Affected products

VendorProductVersions
NEC Platforms, LtdITK6DGS-1(BK) TEL — v5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK32LCGS-1(BK) TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK32TCGS-1(BK) TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK6D-1(BK)TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK12D-1(BK)TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK8LCX-1(BK)TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK8TCGX-1(BK)TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK6DGS-1A(BK) TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK32LCGS-1A(BK) TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK32TCGS-1A(BK) TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK6DGS-1P(BK) TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK32LCGS-1P(BK) TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK32TCGS-1P(BK) TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK6D-1P(BK)TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK12D-1P(BK)TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK6DG-1P(BK)TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK12DG-1P(BK)TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK8LCX-1P(BK)TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK8LCG-1P(BK)TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK32LCG-1P(BK)TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK8TCGX-1P(BK)TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20
NEC Platforms, LtdITK32TCG-1P(BK)TEL — 5.0.0.0 – v5.3.4.4, v5.4.0.0 – v5.6.0.20

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →