cvelist/2024/38xxx/CVE-2024-38280.json

90 lines
3.9 KiB
JSON
Raw Normal View History

2024-06-12 17:00:36 +00:00
{
2024-06-13 18:00:33 +00:00
"data_version": "4.0",
2024-06-12 17:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-38280",
2024-06-13 18:00:33 +00:00
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
2024-06-12 17:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-06-13 18:00:33 +00:00
"value": "An unauthorized user is able to gain access to sensitive data, including credentials, by physically retrieving the hard disk of the product as the data is stored in clear text."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-313: Cleartext Storage in a File or on Disk",
"cweId": "CWE-313"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Motorola Solutions",
"product": {
"product_data": [
{
"product_name": "Vigilant Fixed LPR Coms Box (BCAV1F2-C600)",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0",
"version_value": "3.1.171.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-19",
"refsource": "MISC",
"name": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-19"
2024-06-12 17:00:36 +00:00
}
]
2024-06-13 18:00:33 +00:00
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n<p>\n\n</p><p>Motorola Solutions recommends the following for each identified vulnerability:</p><p></p><p>CVE-2024-38280:</p><ul><li>Apply encryption to all Criminal Justice Information (CJI) data.</li><li>Apply full disk encryption with LUKS encryption standards and add password protection<br>to the GRUB Bootloader.</li><li>Perform column-level encryption for sensitive data in the database.</li></ul><p>All devices shipped after May 10, 2024 are already using full disk encryption. All devices that<br>are not able to have full disk encryption applied have had all CJI data encrypted. No further<br>actions are required by customers.</p>\n\n<br>"
}
],
"value": "Motorola Solutions recommends the following for each identified vulnerability:\n\n\n\nCVE-2024-38280:\n\n * Apply encryption to all Criminal Justice Information (CJI) data.\n * Apply full disk encryption with LUKS encryption standards and add password protection\nto the GRUB Bootloader.\n * Perform column-level encryption for sensitive data in the database.\n\n\nAll devices shipped after May 10, 2024 are already using full disk encryption. All devices that\nare not able to have full disk encryption applied have had all CJI data encrypted. No further\nactions are required by customers."
}
],
"credits": [
{
"lang": "en",
"value": "The Michigan State Police Michigan Cyber Command Center (MC3)"
}
]
2024-06-12 17:00:36 +00:00
}