From ac75ccd01271dc6b1277183fabd7cb7c66ba092a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 25 Oct 2024 13:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/10xxx/CVE-2024-10378.json | 100 +++++++++++++++++++++++++++-- 2024/10xxx/CVE-2024-10379.json | 100 +++++++++++++++++++++++++++-- 2024/10xxx/CVE-2024-10380.json | 105 ++++++++++++++++++++++++++++-- 2024/10xxx/CVE-2024-10381.json | 81 +++++++++++++++++++++-- 2024/10xxx/CVE-2024-10384.json | 18 ++++++ 2024/10xxx/CVE-2024-10385.json | 18 ++++++ 2024/10xxx/CVE-2024-10386.json | 18 ++++++ 2024/10xxx/CVE-2024-10387.json | 18 ++++++ 2024/10xxx/CVE-2024-10388.json | 18 ++++++ 2024/49xxx/CVE-2024-49376.json | 63 ++++++++++++++++-- 2024/49xxx/CVE-2024-49378.json | 63 ++++++++++++++++-- 2024/9xxx/CVE-2024-9991.json | 114 +++++++++++++++++++++++++++++++-- 12 files changed, 686 insertions(+), 30 deletions(-) create mode 100644 2024/10xxx/CVE-2024-10384.json create mode 100644 2024/10xxx/CVE-2024-10385.json create mode 100644 2024/10xxx/CVE-2024-10386.json create mode 100644 2024/10xxx/CVE-2024-10387.json create mode 100644 2024/10xxx/CVE-2024-10388.json diff --git a/2024/10xxx/CVE-2024-10378.json b/2024/10xxx/CVE-2024-10378.json index b95ab2d2ed8..c20fc106a76 100644 --- a/2024/10xxx/CVE-2024-10378.json +++ b/2024/10xxx/CVE-2024-10378.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10378", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical has been found in ESAFENET CDG 5. Affected is the function actionViewCDGRenewFile of the file /com/esafenet/servlet/client/CDGRenewApplicationService.java. The manipulation of the argument CDGRenewFileId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Es wurde eine kritische Schwachstelle in ESAFENET CDG 5 entdeckt. Dabei betrifft es die Funktion actionViewCDGRenewFile der Datei /com/esafenet/servlet/client/CDGRenewApplicationService.java. Durch Beeinflussen des Arguments CDGRenewFileId mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ESAFENET", + "product": { + "product_data": [ + { + "product_name": "CDG", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "5" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.281808", + "refsource": "MISC", + "name": "https://vuldb.com/?id.281808" + }, + { + "url": "https://vuldb.com/?ctiid.281808", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.281808" + }, + { + "url": "https://vuldb.com/?submit.426086", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.426086" + }, + { + "url": "https://flowus.cn/share/5d03f1d5-695a-421b-8445-2273774ea97a?code=G8A6P3", + "refsource": "MISC", + "name": "https://flowus.cn/share/5d03f1d5-695a-421b-8445-2273774ea97a?code=G8A6P3" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "0menc (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2024/10xxx/CVE-2024-10379.json b/2024/10xxx/CVE-2024-10379.json index 85c92b63972..bd1eb33701b 100644 --- a/2024/10xxx/CVE-2024-10379.json +++ b/2024/10xxx/CVE-2024-10379.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10379", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as problematic was found in ESAFENET CDG 5. Affected by this vulnerability is the function actionViewDecyptFile of the file /com/esafenet/servlet/client/DecryptApplicationService.java. The manipulation of the argument decryptFileId with the input ../../../Windows/System32/drivers/etc/hosts leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The affected function has a typo and is missing an R. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "In ESAFENET CDG 5 wurde eine problematische Schwachstelle entdeckt. Hierbei betrifft es die Funktion actionViewDecyptFile der Datei /com/esafenet/servlet/client/DecryptApplicationService.java. Dank der Manipulation des Arguments decryptFileId mit der Eingabe ../../../Windows/System32/drivers/etc/hosts mit unbekannten Daten kann eine path traversal: '../filedir'-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Path Traversal: '../filedir'", + "cweId": "CWE-24" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ESAFENET", + "product": { + "product_data": [ + { + "product_name": "CDG", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "5" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.281809", + "refsource": "MISC", + "name": "https://vuldb.com/?id.281809" + }, + { + "url": "https://vuldb.com/?ctiid.281809", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.281809" + }, + { + "url": "https://vuldb.com/?submit.426087", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.426087" + }, + { + "url": "https://flowus.cn/share/0b03c61a-76a5-4f45-9ee7-a88e0f21d539?code=G8A6P3", + "refsource": "MISC", + "name": "https://flowus.cn/share/0b03c61a-76a5-4f45-9ee7-a88e0f21d539?code=G8A6P3" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "0menc (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 4.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 4.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N" } ] } diff --git a/2024/10xxx/CVE-2024-10380.json b/2024/10xxx/CVE-2024-10380.json index 4ed175914cb..0a3fda3f36c 100644 --- a/2024/10xxx/CVE-2024-10380.json +++ b/2024/10xxx/CVE-2024-10380.json @@ -1,17 +1,114 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10380", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Petrol Pump Management Software 1.0. Affected by this issue is some unknown functionality of the file /admin/ajax_product.php. The manipulation of the argument drop_services leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in SourceCodester Petrol Pump Management Software 1.0 entdeckt. Davon betroffen ist unbekannter Code der Datei /admin/ajax_product.php. Dank Manipulation des Arguments drop_services mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Petrol Pump Management Software", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.281810", + "refsource": "MISC", + "name": "https://vuldb.com/?id.281810" + }, + { + "url": "https://vuldb.com/?ctiid.281810", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.281810" + }, + { + "url": "https://vuldb.com/?submit.431174", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.431174" + }, + { + "url": "https://github.com/K1nako0/tmp_vuln5/blob/main/README.md", + "refsource": "MISC", + "name": "https://github.com/K1nako0/tmp_vuln5/blob/main/README.md" + }, + { + "url": "https://www.sourcecodester.com/", + "refsource": "MISC", + "name": "https://www.sourcecodester.com/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "K1nako (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2024/10xxx/CVE-2024-10381.json b/2024/10xxx/CVE-2024-10381.json index 643289c00c2..609f9643530 100644 --- a/2024/10xxx/CVE-2024-10381.json +++ b/2024/10xxx/CVE-2024-10381.json @@ -1,18 +1,89 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10381", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vdisclose@cert-in.org.in", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This vulnerability exists in Matrix Door Controller Cosec Vega FAXQ due to improper implementation of session management at the web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http request on the vulnerable device.\n\nSuccessful exploitation of this vulnerability could allow remote attacker to gain unauthorized access and take complete control of the targeted device." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-288: Authentication Bypass Using an Alternate Path or Channel", + "cweId": "CWE-288" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Matrix Comsec", + "product": { + "product_data": [ + { + "product_name": "Matrix Door Controller Cosec Vega FAXQ", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "" + } + ], + "value": "Upgrade Matrix Door Controller Cosec Vega FAXQ to firmware version V2R17" + } + ], + "credits": [ + { + "lang": "en", + "value": "This vulnerability is reported by Arko Dhar and Souvik Kandar from Redinent Innovations Engineering & Research Team, Karnataka, India." + } + ] } \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10384.json b/2024/10xxx/CVE-2024-10384.json new file mode 100644 index 00000000000..dcd8795fcf3 --- /dev/null +++ b/2024/10xxx/CVE-2024-10384.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10384", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10385.json b/2024/10xxx/CVE-2024-10385.json new file mode 100644 index 00000000000..67f531c7560 --- /dev/null +++ b/2024/10xxx/CVE-2024-10385.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10385", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10386.json b/2024/10xxx/CVE-2024-10386.json new file mode 100644 index 00000000000..e47af6ce131 --- /dev/null +++ b/2024/10xxx/CVE-2024-10386.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10386", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10387.json b/2024/10xxx/CVE-2024-10387.json new file mode 100644 index 00000000000..040cff8c06e --- /dev/null +++ b/2024/10xxx/CVE-2024-10387.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10387", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/10xxx/CVE-2024-10388.json b/2024/10xxx/CVE-2024-10388.json new file mode 100644 index 00000000000..32a44e57b47 --- /dev/null +++ b/2024/10xxx/CVE-2024-10388.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10388", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/49xxx/CVE-2024-49376.json b/2024/49xxx/CVE-2024-49376.json index 70a14dc080f..9e8c8a6e26f 100644 --- a/2024/49xxx/CVE-2024-49376.json +++ b/2024/49xxx/CVE-2024-49376.json @@ -1,18 +1,73 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-49376", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Autolab, a course management service that enables auto-graded programming assignments, has misconfigured reset password permissions in version 3.0.0. For email-based accounts, users with insufficient privileges could reset and theoretically access privileged users' accounts by resetting their passwords. This issue is fixed in version 3.0.1. No known workarounds exist." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Improper Authentication", + "cweId": "CWE-287" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "autolab", + "product": { + "product_data": [ + { + "product_name": "Autolab", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "= 3.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/autolab/Autolab/security/advisories/GHSA-v46j-h43h-rwrm", + "refsource": "MISC", + "name": "https://github.com/autolab/Autolab/security/advisories/GHSA-v46j-h43h-rwrm" + }, + { + "url": "https://github.com/autolab/Autolab/commit/301689ab5c5e39d13bab47b71eaf8998d04bcc9b", + "refsource": "MISC", + "name": "https://github.com/autolab/Autolab/commit/301689ab5c5e39d13bab47b71eaf8998d04bcc9b" + } + ] + }, + "source": { + "advisory": "GHSA-v46j-h43h-rwrm", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2024/49xxx/CVE-2024-49378.json b/2024/49xxx/CVE-2024-49378.json index 008c2f82338..e6cf45eb282 100644 --- a/2024/49xxx/CVE-2024-49378.json +++ b/2024/49xxx/CVE-2024-49378.json @@ -1,18 +1,73 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-49378", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "smartUp, a web browser mouse gestures extension, has a universal cross-site scripting issue in the Edge and Firefox versions of smartUp 7.2.622.1170. The vulnerability allows another extension to execute arbitrary code in the context of the user\u2019s tab. As of time of publication, no known patches exist." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "zimocode", + "product": { + "product_data": [ + { + "product_name": "smartup", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "<= 7.2.622.1170" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://securitylab.github.com/advisories/GHSL-2024-011_smartup/", + "refsource": "MISC", + "name": "https://securitylab.github.com/advisories/GHSL-2024-011_smartup/" + }, + { + "url": "https://github.com/zimocode/smartup/blob/2144ec161697751b1a6702f1af866726ea689e4e/js/background.js#L3800", + "refsource": "MISC", + "name": "https://github.com/zimocode/smartup/blob/2144ec161697751b1a6702f1af866726ea689e4e/js/background.js#L3800" + } + ] + }, + "source": { + "advisory": "GHSA-9656-c575-pcgm", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2024/9xxx/CVE-2024-9991.json b/2024/9xxx/CVE-2024-9991.json index e61fc268cf2..bc9bb22bf5d 100644 --- a/2024/9xxx/CVE-2024-9991.json +++ b/2024/9xxx/CVE-2024-9991.json @@ -1,18 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-9991", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "vdisclose@cert-in.org.in", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This vulnerability exists in Philips lighting devices due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the plaintext Wi-Fi credentials stored on the vulnerable device.\n\nSuccessful exploitation of this vulnerability could allow an attacker to gain unauthorized access to the Wi-Fi network to which vulnerable device is connected." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-312: Cleartext Storage of Sensitive Information", + "cweId": "CWE-312" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Philips Lighting (Signify Innovations India)", + "product": { + "product_data": [ + { + "product_name": "Philips Smart Wi-Fi LED Batten 24-Watt", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "<1.33.1" + } + ] + } + }, + { + "product_name": "Philips Smart Wi-Fi LED T Beamer 20-Watt", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "<1.33.1" + } + ] + } + }, + { + "product_name": "Philips Smart Bulb 9,10,12-Watt", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "<1.33.1" + } + ] + } + }, + { + "product_name": "Philips Smart T-Bulb 10,12-Watt", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "<1.33.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0329", + "refsource": "MISC", + "name": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0329" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Upgrade Philips Smart Wi-Fi LED Batten 24-Watt, LED T Beamer 20-Watt, Smart Bulb 9,10,12-Watt and Smart T-Bulb 10,12-Watt to version 1.33.1
" + } + ], + "value": "Upgrade Philips Smart Wi-Fi LED Batten 24-Watt, LED T Beamer 20-Watt, Smart Bulb 9,10,12-Watt and Smart T-Bulb 10,12-Watt to version 1.33.1" + } + ], + "credits": [ + { + "lang": "en", + "value": "This vulnerability is reported by Shravan Singh, Amey Chavekar. Vishal Giri and Dr. Faruk Kazi from CoE- CNDS Lab, VJTI Mumbai, India" + } + ] } \ No newline at end of file