- What is the severity of CVE-2024-43698?
- CVE-2024-43698 has been scored as a critical severity vulnerability.
- How to fix CVE-2024-43698?
- To fix CVE-2024-43698: Kieback&Peter DDC4002, DDC4100, DDC4200, DDC4200-L and DDC4400 controllers are considered End-of-Life (EOL) and are no longer supported. Users operating these controllers should ensure they are operated in a strictly separate OT environment and consider updating to a supported controller. Kieback&Peter recommends users update to DDC4002e, DDC4200e, DDC4400e, DDC4020e and DDC4040e controllers. Kieback&Peter recommends all affected users contact their local Kieback&Peter office to update the firmware of the supported DDC systems to v1.21.0 or later.
- Is CVE-2024-43698 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2024-43698 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2024-43698?
- CVE-2024-43698 affects Kieback&Peter DDC4040e, Kieback&Peter DDC4020e, Kieback&Peter DDC4400e, Kieback&Peter DDC4200e, Kieback&Peter DDC4002e, Kieback&Peter DDC4400, Kieback&Peter DDC4200-L, Kieback&Peter DDC4200, Kieback&Peter DDC4100, Kieback&Peter DDC4002.