cve/2024/CVE-2024-7698.md

53 lines
4.1 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-7698](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7698)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%202102&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%202105&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%204102%20PCI&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%204102%20PCIE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%204302&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%204305&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20CENTERPORT%20VPN-1000&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20CORE%20TX%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20CORE%20TX&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20DELTA%20TX%2FTX%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20DELTA%20TX%2FTX&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20GT%2FGT%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20GT%2FGT&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20PCI4000%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20PCI4000&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20PCIE4000%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20PCIE4000&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20RS2000%20TX%2FTX%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20RS2000%20TX%2FTX-B&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20RS2005%20TX%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20RS4000%20TX%2FTX%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20RS4000%20TX%2FTX&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20RS4000%20TX%2FTX-M&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20RS4000%20TX%2FTX-P&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20RS4004%20TX%2FDTX%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20RS4004%20TX%2FDTX&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20SMART2%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FL%20MGUARD%20SMART2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TC%20MGUARD%20RS2000%203G%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TC%20MGUARD%20RS2000%204G%20ATT%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TC%20MGUARD%20RS2000%204G%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TC%20MGUARD%20RS2000%204G%20VZW%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TC%20MGUARD%20RS4000%203G%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TC%20MGUARD%20RS4000%204G%20ATT%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TC%20MGUARD%20RS4000%204G%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TC%20MGUARD%20RS4000%204G%20VZW%20VPN&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data&color=brightgreen)
### Description
A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF attacks.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds