mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-08 22:18:22 +00:00
100 lines
3.6 KiB
JSON
100 lines
3.6 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2024-41796",
|
||
|
"sourceIdentifier": "productcert@siemens.com",
|
||
|
"published": "2025-04-08T09:15:20.813",
|
||
|
"lastModified": "2025-04-08T09:15:20.813",
|
||
|
"vulnStatus": "Received",
|
||
|
"cveTags": [],
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices allows to change the login password without knowing the current password. In combination with a prepared CSRF attack (CVE-2024-41795) an unauthenticated attacker could be able to set the password to an attacker-controlled value."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV40": [
|
||
|
{
|
||
|
"source": "productcert@siemens.com",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "4.0",
|
||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||
|
"baseScore": 6.9,
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"attackRequirements": "NONE",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "ACTIVE",
|
||
|
"vulnConfidentialityImpact": "NONE",
|
||
|
"vulnIntegrityImpact": "HIGH",
|
||
|
"vulnAvailabilityImpact": "NONE",
|
||
|
"subConfidentialityImpact": "NONE",
|
||
|
"subIntegrityImpact": "NONE",
|
||
|
"subAvailabilityImpact": "NONE",
|
||
|
"exploitMaturity": "NOT_DEFINED",
|
||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||
|
"integrityRequirement": "NOT_DEFINED",
|
||
|
"availabilityRequirement": "NOT_DEFINED",
|
||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||
|
"Safety": "NOT_DEFINED",
|
||
|
"Automatable": "NOT_DEFINED",
|
||
|
"Recovery": "NOT_DEFINED",
|
||
|
"valueDensity": "NOT_DEFINED",
|
||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||
|
"providerUrgency": "NOT_DEFINED"
|
||
|
}
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "productcert@siemens.com",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
|
"baseScore": 6.5,
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "REQUIRED",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "NONE"
|
||
|
},
|
||
|
"exploitabilityScore": 2.8,
|
||
|
"impactScore": 3.6
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "productcert@siemens.com",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-620"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://cert-portal.siemens.com/productcert/html/ssa-187636.html",
|
||
|
"source": "productcert@siemens.com"
|
||
|
}
|
||
|
]
|
||
|
}
|