2024-07-31 18:03:13 +00:00
{
"id" : "CVE-2024-6977" ,
"sourceIdentifier" : "2505284f-8ffb-486c-bf60-e19c1097a90b" ,
"published" : "2024-07-31T17:15:11.860" ,
2024-08-27 16:03:16 +00:00
"lastModified" : "2024-08-27T15:41:15.443" ,
"vulnStatus" : "Analyzed" ,
2024-07-31 18:03:13 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "A vulnerability in Cato Networks SDP Client on Windows allows the insertion of sensitive information into the log file, which can lead to an account takeover. However, the attack requires bypassing protections on modifying the tunnel token on a the attacker's system.This issue affects SDP Client: before 5.10.34."
2024-08-01 14:03:18 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad en Cato Networks SDP Client en Windows permite la inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro, lo que puede llevar a la apropiaci\u00f3n de la cuenta. Sin embargo, el ataque requiere eludir las protecciones al modificar el token del t\u00fanel en el sistema del atacante. Este problema afecta a SDP Client: anterior a 5.10.34."
2024-07-31 18:03:13 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-08-27 16:03:16 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.0 ,
"impactScore" : 4.0
} ,
2024-07-31 18:03:13 +00:00
{
"source" : "2505284f-8ffb-486c-bf60-e19c1097a90b" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.0 ,
"impactScore" : 4.0
}
]
} ,
"weaknesses" : [
2024-08-27 16:03:16 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-532"
}
]
} ,
2024-07-31 18:03:13 +00:00
{
"source" : "2505284f-8ffb-486c-bf60-e19c1097a90b" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-532"
}
]
}
] ,
2024-08-27 16:03:16 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:catonetworks:cato_client:*:*:*:*:*:windows:*:*" ,
"versionEndIncluding" : "5.10.34" ,
"matchCriteriaId" : "01645369-2C33-41A4-9BAF-83A2228CAFBE"
}
]
}
]
}
] ,
2024-07-31 18:03:13 +00:00
"references" : [
{
"url" : "https://support.catonetworks.com/hc/en-us/articles/19766795729437-CVE-2024-6977-Windows-SDP-Client-Sensitive-data-in-trace-logs-can-lead-to-account-takeover" ,
2024-08-27 16:03:16 +00:00
"source" : "2505284f-8ffb-486c-bf60-e19c1097a90b" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
2024-07-31 18:03:13 +00:00
}
]
}