2025-02-24 17:04:07 +00:00

71 lines
2.0 KiB
JSON

{
"id": "CVE-2025-24527",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-29T17:15:29.873",
"lastModified": "2025-02-24T16:15:14.683",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Akamai Enterprise Application Access (EAA) before 2025-01-17. If an admin knows another tenant's 128-bit connector GUID, they can execute debug commands on that connector."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Akamai Enterprise Application Access (EAA) antes del 17 de enero de 2025. Si un administrador conoce el GUID del conector de 128 bits de otro inquilino, puede ejecutar comandos de depuraci\u00f3n en ese conector."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [
{
"url": "https://techdocs.akamai.com/eaa/changelog",
"source": "cve@mitre.org"
},
{
"url": "https://techdocs.akamai.com/eaa/changelog/january-29-2025",
"source": "cve@mitre.org"
}
]
}