mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
60 lines
2.4 KiB
JSON
60 lines
2.4 KiB
JSON
{
|
|
"id": "CVE-2024-12011",
|
|
"sourceIdentifier": "prodsec@nozominetworks.com",
|
|
"published": "2025-02-13T16:15:43.750",
|
|
"lastModified": "2025-02-13T16:15:43.750",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A CWE-126 \u201cBuffer Over-read\u201d was discovered affecting the 130.8005 TCP/IP Gateway running firmware version 12h. The information disclosure can be triggered by leveraging a memory leak affecting the web server. A remote unauthenticated attacker can exploit this vulnerability in order to leak valid authentication tokens from the process memory associated to users currently logged to the system and bypass the authentication mechanism."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se descubri\u00f3 una vulnerabilidad CWE-126 de \u201csobrelectura de b\u00fafer\u201d que afectaba a la puerta de enlace TCP/IP 130.8005 con la versi\u00f3n de firmware 12h. La divulgaci\u00f3n de informaci\u00f3n se puede desencadenar aprovechando una fuga de memoria que afecta al servidor web. Un atacante remoto no autenticado puede explotar esta vulnerabilidad para filtrar tokens de autenticaci\u00f3n v\u00e1lidos de la memoria de proceso asociada a los usuarios que est\u00e1n conectados actualmente al sistema y eludir el mecanismo de autenticaci\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "prodsec@nozominetworks.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
|
|
"baseScore": 7.6,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "LOW"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 4.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "prodsec@nozominetworks.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-126"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-12011",
|
|
"source": "prodsec@nozominetworks.com"
|
|
}
|
|
]
|
|
} |