2024-08-07 06:03:13 +00:00
{
"id" : "CVE-2024-36130" ,
"sourceIdentifier" : "support@hackerone.com" ,
"published" : "2024-08-07T04:17:17.967" ,
2024-08-12 20:03:14 +00:00
"lastModified" : "2024-08-12T18:52:50.947" ,
"vulnStatus" : "Analyzed" ,
2024-08-07 06:03:13 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "An insufficient authorization vulnerability in web component of EPMM prior to 12.1.0.1 allows an unauthorized attacker within the network to execute arbitrary commands on the underlying operating system of the appliance."
2024-08-07 16:03:12 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad de autorizaci\u00f3n insuficiente en el componente web de EPMM anterior a 12.1.0.1 permite que un atacante no autorizado dentro de la red ejecute comandos arbitrarios en el sistema operativo subyacente del dispositivo."
2024-08-07 06:03:13 +00:00
}
] ,
"metrics" : {
2024-08-12 20:03:14 +00:00
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
] ,
2024-08-07 06:03:13 +00:00
"cvssMetricV30" : [
{
"source" : "support@hackerone.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
2024-08-08 22:03:14 +00:00
"weaknesses" : [
2024-08-12 20:03:14 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-287"
}
]
} ,
2024-08-08 22:03:14 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-285"
}
]
}
] ,
2024-08-12 20:03:14 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "12.1.0.1" ,
"matchCriteriaId" : "06657E1C-4C7D-4E54-AF6D-096DFE8216EF"
}
]
}
]
}
] ,
2024-08-07 06:03:13 +00:00
"references" : [
{
"url" : "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-for-Mobile-EPMM-July-2024" ,
2024-08-12 20:03:14 +00:00
"source" : "support@hackerone.com" ,
"tags" : [
"Vendor Advisory"
]
2024-08-07 06:03:13 +00:00
}
]
}