2024-10-25 14:03:50 +00:00
{
"id" : "CVE-2024-10381" ,
"sourceIdentifier" : "vdisclose@cert-in.org.in" ,
"published" : "2024-10-25T13:15:17.810" ,
2024-11-14 23:03:36 +00:00
"lastModified" : "2024-11-14T21:44:53.280" ,
"vulnStatus" : "Analyzed" ,
2024-10-25 14:03:50 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "This vulnerability exists in Matrix Door Controller Cosec Vega FAXQ due to improper implementation of session management at the web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http request on the vulnerable device.\n\nSuccessful exploitation of this vulnerability could allow remote attacker to gain unauthorized access and take complete control of the targeted device."
2024-10-28 15:04:19 +00:00
} ,
{
"lang" : "es" ,
"value" : "Esta vulnerabilidad existe en Matrix Door Controller Cosec Vega FAXQ debido a una implementaci\u00f3n incorrecta de la administraci\u00f3n de sesiones en la interfaz de administraci\u00f3n basada en web. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud http especialmente manipulada en el dispositivo vulnerable. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir a un atacante remoto obtener acceso no autorizado y tomar el control total del dispositivo objetivo."
2024-10-25 14:03:50 +00:00
}
] ,
"metrics" : {
"cvssMetricV40" : [
{
"source" : "vdisclose@cert-in.org.in" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "4.0" ,
"vectorString" : "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.3 ,
"baseSeverity" : "CRITICAL" ,
2024-10-25 14:03:50 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"attackRequirements" : "NONE" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
2025-03-02 03:03:52 +00:00
"vulnConfidentialityImpact" : "HIGH" ,
"vulnIntegrityImpact" : "HIGH" ,
"vulnAvailabilityImpact" : "HIGH" ,
"subConfidentialityImpact" : "LOW" ,
"subIntegrityImpact" : "LOW" ,
"subAvailabilityImpact" : "LOW" ,
2024-10-25 14:03:50 +00:00
"exploitMaturity" : "NOT_DEFINED" ,
2025-03-02 03:03:52 +00:00
"confidentialityRequirement" : "NOT_DEFINED" ,
"integrityRequirement" : "NOT_DEFINED" ,
"availabilityRequirement" : "NOT_DEFINED" ,
2024-10-25 14:03:50 +00:00
"modifiedAttackVector" : "NOT_DEFINED" ,
"modifiedAttackComplexity" : "NOT_DEFINED" ,
"modifiedAttackRequirements" : "NOT_DEFINED" ,
"modifiedPrivilegesRequired" : "NOT_DEFINED" ,
"modifiedUserInteraction" : "NOT_DEFINED" ,
2025-03-02 03:03:52 +00:00
"modifiedVulnConfidentialityImpact" : "NOT_DEFINED" ,
"modifiedVulnIntegrityImpact" : "NOT_DEFINED" ,
"modifiedVulnAvailabilityImpact" : "NOT_DEFINED" ,
"modifiedSubConfidentialityImpact" : "NOT_DEFINED" ,
"modifiedSubIntegrityImpact" : "NOT_DEFINED" ,
"modifiedSubAvailabilityImpact" : "NOT_DEFINED" ,
"Safety" : "NOT_DEFINED" ,
"Automatable" : "NOT_DEFINED" ,
"Recovery" : "NOT_DEFINED" ,
2024-10-25 14:03:50 +00:00
"valueDensity" : "NOT_DEFINED" ,
"vulnerabilityResponseEffort" : "NOT_DEFINED" ,
2024-12-08 03:06:42 +00:00
"providerUrgency" : "NOT_DEFINED"
2024-10-25 14:03:50 +00:00
}
}
2024-11-14 23:03:36 +00:00
] ,
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2024-11-14 23:03:36 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-11-14 23:03:36 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
2024-10-25 14:03:50 +00:00
]
} ,
"weaknesses" : [
{
2024-12-08 03:06:42 +00:00
"source" : "vdisclose@cert-in.org.in" ,
"type" : "Secondary" ,
2024-11-14 23:03:36 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-288"
2024-11-14 23:03:36 +00:00
}
]
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-10-25 14:03:50 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "NVD-CWE-Other"
2024-10-25 14:03:50 +00:00
}
]
}
] ,
2024-11-14 23:03:36 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:matrixcomsec:cosec_vega_faxq_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "v2r17" ,
"matchCriteriaId" : "555B4F91-2923-4F99-9FA5-61149CA5D1C5"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:matrixcomsec:cosec_vega_faxq:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9156114-135B-4378-9315-A027E36910B3"
}
]
}
]
}
] ,
2024-10-25 14:03:50 +00:00
"references" : [
{
"url" : "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0328" ,
2024-11-14 23:03:36 +00:00
"source" : "vdisclose@cert-in.org.in" ,
"tags" : [
"Third Party Advisory"
]
2024-10-25 14:03:50 +00:00
}
]
}