An attacker who successfully exploited these vulnerabilities could cause enable command execution. A vulnerability exists in the AC500 V3 version mentioned. After successfully exploiting CVE-2024-12429 (directory traversal), a successfully authenticated attacker can inject arbitrary commands into a specifically crafted file, which then will be executed by root user. All AC500 V3 products (PM5xxx) with firmware version earlier than 3.8.0 are affected by this vulnerability.
History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Tue, 07 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Jan 2025 16:45:00 +0000

Type Values Removed Values Added
Description An attacker who successfully exploited these vulnerabilities could cause enable command execution. A vulnerability exists in the AC500 V3 version mentioned. After successfully exploiting CVE-2024-12429 (directory traversal), a successfully authenticated attacker can inject arbitrary commands into a specifically crafted file, which then will be executed by root user. All AC500 V3 products (PM5xxx) with firmware version earlier than 3.8.0 are affected by this vulnerability.
Weaknesses CWE-280
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ABB

Published: 2025-01-07T16:28:41.952Z

Updated: 2025-11-03T21:52:23.053Z

Reserved: 2024-12-10T16:59:02.495Z

Link: CVE-2024-12430

cve-icon Vulnrichment

Updated: 2025-11-03T21:52:23.053Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-07T17:15:20.703

Modified: 2025-11-03T22:16:39.697

Link: CVE-2024-12430

cve-icon Redhat

No data.