Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23765: n/a

0
Medium
VulnerabilityCVE-2024-23765cvecve-2024-23765
Published: Wed Jun 26 2024 (06/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered on HMS Anybus X-Gateway AB7832-F 3 devices. The gateway exposes an unidentified service on port 7412 on the network. All the network services of the gateway become unresponsive after sending 85 requests to this port. The content and length of the frame does not matter. The device needs to be restarted to resume operations.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:16:22 UTC

Technical Analysis

CVE-2024-23765 identifies a denial-of-service vulnerability in the HMS Anybus X-Gateway AB7832-F 3 devices. The gateway exposes an unidentified network service on TCP port 7412. When this service receives 85 requests, regardless of the request content or length, it causes the gateway's network services to become unresponsive. This effectively results in a denial-of-service condition, as the device stops responding to network communications until it is manually restarted. The vulnerability does not require authentication or user interaction, but an attacker must have local network access to send the requests. The CVSS 3.1 base score is 4.0, reflecting a medium severity due to the limited impact on confidentiality and integrity but a clear impact on availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability likely stems from resource exhaustion or a flaw in the handling of requests on port 7412, which is an undocumented or proprietary service. This gateway is commonly used in industrial automation and control systems to connect different network protocols, making availability critical for operational continuity.

Potential Impact

The primary impact of this vulnerability is a denial of service affecting the availability of the HMS Anybus X-Gateway AB7832-F 3 devices. Since these gateways are used to bridge industrial networks and protocols, their unavailability can disrupt communication between control systems, sensors, and actuators. This can lead to operational downtime, loss of monitoring and control capabilities, and potential safety risks in industrial environments. Although confidentiality and integrity are not affected, the loss of availability can have significant operational and financial consequences, especially in critical infrastructure, manufacturing plants, and industrial automation sectors. The requirement for a manual restart to recover increases downtime and operational burden. Organizations relying on these gateways without redundancy or automated recovery mechanisms are particularly vulnerable to sustained disruptions.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement network segmentation to restrict access to the Anybus gateway's port 7412 service only to trusted devices and administrators. Monitoring network traffic for unusual or repeated requests to port 7412 can help detect attempted exploitation. Where possible, configure automated health checks and restart mechanisms for the gateway to minimize downtime in case of service unresponsiveness. Engage with HMS to obtain firmware updates or patches once available. Additionally, consider deploying redundant gateways or failover mechanisms to maintain operational continuity if one device becomes unresponsive. Document and train operational staff on manual restart procedures and incident response plans related to gateway outages. Finally, review and harden network access controls and firewall rules to limit exposure of the gateway's management and service ports.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d54b7ef31ef0b5705f5

Added to database: 2/25/2026, 9:44:52 PM

Last enriched: 2/26/2026, 10:16:22 AM

Last updated: 4/12/2026, 6:13:54 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses