mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
83 lines
3.1 KiB
JSON
83 lines
3.1 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-11946",
|
|
"ASSIGNER": "zdi-disclosures@trendmicro.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "iXsystems TrueNAS CORE fetch_plugin_packagesites tar Cleartext Transmission of Sensitive Information Vulnerability. This vulnerability allows network-adjacent attackers to tamper with firmware update files on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of firmware updates. The issue results from the use of an insecure protocol to deliver updates. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-25668."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-319: Cleartext Transmission of Sensitive Information",
|
|
"cweId": "CWE-319"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "iXsystems",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "TrueNAS CORE",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "13.3-RELEASE"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1644/",
|
|
"refsource": "MISC",
|
|
"name": "https://www.zerodayinitiative.com/advisories/ZDI-24-1644/"
|
|
},
|
|
{
|
|
"url": "https://www.truenas.com/docs/core/13.0/gettingstarted/corereleasenotes/#130-u63",
|
|
"refsource": "MISC",
|
|
"name": "https://www.truenas.com/docs/core/13.0/gettingstarted/corereleasenotes/#130-u63"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"lang": "en",
|
|
"value": "Daan Keuper, Thijs Alkemade and Khaled Nassar from Computest Sector 7"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
|
"baseScore": 3.1,
|
|
"baseSeverity": "LOW"
|
|
}
|
|
]
|
|
}
|
|
} |