{"vulnerability": "cve-2024-12429", "sightings": [{"uuid": "35fa9a03-b577-4d2e-9d60-401495c698d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12429", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113788073102479974", "content": "", "creation_timestamp": "2025-01-07T16:43:26.960110Z"}, {"uuid": "c79a9557-28a8-47bb-970c-f77aa5682194", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12429", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/530", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12429\n\ud83d\udd39 Description: An attacker who successfully exploited these vulnerabilities could grant read access to files.\u00a0A vulnerability exists in the AC500 V3 version mentioned. A\u00a0successfully \nauthenticated attacker can use this vulnerability to read system wide files and configuration\n\n\nAll AC500 V3 products (PM5xxx) with firmware version earlier than 3.8.0 are affected by this vulnerability.\n\ud83d\udccf Published: 2025-01-07T16:53:41.269Z\n\ud83d\udccf Modified: 2025-01-07T17:45:25.384Z\n\ud83d\udd17 References:\n1. https://search.abb.com/library/Download.aspx?DocumentID=3ADR011377&amp;LanguageCode=en&amp;DocumentPartId=&amp;Action=Launch", "creation_timestamp": "2025-01-07T18:40:56.000000Z"}, {"uuid": "a39b2042-ebf7-4ee6-a0f3-a44a43a61f0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12429", "type": "seen", "source": "https://t.me/cvedetector/14586", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12429 - AC500 V3 File Access Unauthorized Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-12429 \nPublished : Jan. 7, 2025, 5:15 p.m. | 31\u00a0minutes ago \nDescription : An attacker who successfully exploited these vulnerabilities could grant read access to files.\u00a0A vulnerability exists in the AC500 V3 version mentioned. A\u00a0successfully   \nauthenticated attacker can use this vulnerability to read system wide files and configuration  \n  \n  \nAll AC500 V3 products (PM5xxx) with firmware version earlier than 3.8.0 are affected by this vulnerability. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T18:54:14.000000Z"}, {"uuid": "e79cecc8-f22f-40cc-b605-d1c7ef6fc950", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12429", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113788120858254362", "content": "", "creation_timestamp": "2025-01-07T16:55:34.468880Z"}, {"uuid": "3fa8c0f8-4746-4ff8-9921-7e4c5306f5fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12429", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf65miqw7v2e", "content": "", "creation_timestamp": "2025-01-07T17:15:40.938643Z"}, {"uuid": "28cf6623-ec53-491c-b385-b48bef664970", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12429", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf65mljqyn2e", "content": "", "creation_timestamp": "2025-01-07T17:15:43.803878Z"}, {"uuid": "6d07cb19-c602-4d63-b50e-9c7b7869a129", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12429", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/526", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12430\n\ud83d\udd39 Description: An attacker who successfully exploited these vulnerabilities could cause enable command execution. A vulnerability exists in the AC500 V3 version mentioned. After successfully exploiting CVE-2024-12429 (directory traversal), a successfully authenticated attacker can inject arbitrary commands into a specifically crafted file, which then will be executed by root user.\nAll AC500 V3 products (PM5xxx) with firmware version earlier than 3.8.0 are affected by this vulnerability.\n\ud83d\udccf Published: 2025-01-07T16:28:41.952Z\n\ud83d\udccf Modified: 2025-01-07T17:56:26.206Z\n\ud83d\udd17 References:\n1. https://search.abb.com/library/Download.aspx?DocumentID=3ADR011377&amp;LanguageCode=en&amp;DocumentPartId=&amp;Action=Launch", "creation_timestamp": "2025-01-07T18:40:32.000000Z"}]}