cve/2024/CVE-2024-28020.md

30 lines
1.8 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-28020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28020)
![](https://img.shields.io/static/v1?label=Product&message=FOXMAN-UN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=UNEM&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=FOXMAN-UN%20R15A%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=FOXMAN-UN%20R15B%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=FOXMAN-UN%20R16A%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=FOXMAN-UN%20R16B%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=UNEM%20R15A%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=UNEM%20R15B%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=UNEM%20R16A%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=UNEM%20R16B%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=r15a%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=r15b%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=r16a%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=r16b%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-286%20Incorrect%20User%20Management&color=brightgreen)
### Description
A user/password reuse vulnerability exists in the FOXMAN-UN/UNEM applicationand server management. If exploited a malicious high-privilegeduser could use the passwords and login information through complex routines to extend access on the server and other services.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds