cvelist/2024/36xxx/CVE-2024-36473.json

87 lines
2.9 KiB
JSON
Raw Normal View History

2024-05-29 00:00:36 +00:00
{
2024-06-10 22:01:09 +00:00
"data_version": "4.0",
2024-05-29 00:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-36473",
2024-06-10 22:01:09 +00:00
"ASSIGNER": "security@trendmicro.com",
"STATE": "PUBLIC"
2024-05-29 00:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-06-10 22:01:09 +00:00
"value": "Trend Micro VPN Proxy One Pro, version 5.8.1012 and below is vulnerable to an arbitrary file overwrite or create attack but is limited to local Denial of Service (DoS) and under specific conditions can lead to elevation of privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Trend Micro, Inc.",
"product": {
"product_data": [
{
"product_name": "Trend Micro VPN Proxy One Pro",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "5.8",
"version_value": "5.8.1012"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://helpcenter.trendmicro.com/en-us/article/tmka-07247",
"refsource": "MISC",
"name": "https://helpcenter.trendmicro.com/en-us/article/tmka-07247"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-585/",
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-24-585/"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseSeverity": "MEDIUM",
"baseScore": 5.3,
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"
2024-05-29 00:00:36 +00:00
}
]
}
}