mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
72 lines
3.1 KiB
JSON
72 lines
3.1 KiB
JSON
{
|
|
"id": "CVE-2024-29150",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-05-07T17:15:07.963",
|
|
"lastModified": "2024-11-21T09:07:39.327",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An issue was discovered in Alcatel-Lucent ALE NOE deskphones through 86x8_NOE-R300.1.40.12.4180 and SIP deskphones through 86x8_SIP-R200.1.01.10.728. Because of improper privilege management, an authenticated attacker is able to create symlinks to sensitive and protected data in locations that are used for debugging files. Given that the process of gathering debug logs is carried out with root privileges, any file referenced in the symlink is consequently written to the debug archive, thereby granting accessibility to the attacker."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se descubri\u00f3 un problema en los tel\u00e9fonos de escritorio Alcatel-Lucent ALE NOE hasta 86x8_NOE-R300.1.40.12.4180 y en los tel\u00e9fonos de escritorio SIP hasta 86x8_SIP-R200.1.01.10.728. Debido a una gesti\u00f3n de privilegios inadecuada, un atacante autenticado puede crear enlaces simb\u00f3licos a datos confidenciales y protegidos en ubicaciones que se utilizan para depurar archivos. Dado que el proceso de recopilaci\u00f3n de registros de depuraci\u00f3n se lleva a cabo con privilegios de root, cualquier archivo al que se haga referencia en el enlace simb\u00f3lico se escribe en el archivo de depuraci\u00f3n, otorgando as\u00ed accesibilidad al atacante."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-269"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.al-enterprise.com/-/media/assets/internet/documents/n-to-s/sa-c0071-ed01.pdf",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-011.txt",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.al-enterprise.com/-/media/assets/internet/documents/n-to-s/sa-c0071-ed01.pdf",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-011.txt",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |