有关固件版本的更新通知 : M2M/IoT解决方案CONPROSYS™控制器

非洲、亚洲、欧洲、日本、中东、北美、大洋洲、中南美

康泰克更新了M2M/IoT解决方案CONPROSYS™ M2M控制器系列, M2M网关系列的固件版本。请参照以下更新内容。

更新内容

系列名 更新内容 下载
M2M控制器系列
精巧一体型
Ver3.7.6 -> Ver3.8.0
--------------------------------
- Added the following vulnerability countermeasures.
1. OS Command Injection Vulnerability
  In the following page, the entered value is not properly validated, which makes it possible to execute OS commands.
 [Network] maintenance page, [Mail] setting page, [Static Routing] setting page, [Port Forwarding] setting page, [IP Filter] setting page
2. Firmware tampering vulnerability
 Firmware structure can be analyzed due to insufficient cryptographic strength of firmware update files.
3. Vulnerability to inadequate access restrictions
 Network maintenance page originally accessible only with administrator privileges can be accessed with normal privileges.
下载
M2M控制器系列
堆栈组合型
Ver3.8.8 -> Ver3.9.0
--------------------------------
- Added the following vulnerability countermeasures.
1. OS Command Injection Vulnerability
  In the following page, the entered value is not properly validated, which makes it possible to execute OS commands.
 [Network] maintenance page, [Mail] setting page, [Static Routing] setting page, [Port Forwarding] setting page, [IP Filter] setting page
2. Firmware tampering vulnerability
 Firmware structure can be analyzed due to insufficient cryptographic strength of firmware update files.
3. Vulnerability to inadequate access restrictions
 Network maintenance page originally accessible only with administrator privileges can be accessed with normal privileges.
下载
M2M网关系列 Ver3.7.10 -> Ver3.8.0
--------------------------------
- Added the following vulnerability countermeasures.
1. OS Command Injection Vulnerability
  In the following page, the entered value is not properly validated, which makes it possible to execute OS commands.
 [Network] maintenance page, [Mail] setting page, [Static Routing] setting page, [Port Forwarding] setting page, [IP Filter] setting page
2. Firmware tampering vulnerability
 Firmware structure can be analyzed due to insufficient cryptographic strength of firmware update files.
3. Vulnerability to inadequate access restrictions
 Network maintenance page originally accessible only with administrator privileges can be accessed with normal privileges.
下载

近期的软件更新信息

查看全部通知

To PageTop