2024-12-08 03:06:42 +00:00

64 lines
1.9 KiB
JSON

{
"id": "CVE-2024-52544",
"sourceIdentifier": "cve@rapid7.com",
"published": "2024-12-03T18:15:15.327",
"lastModified": "2024-12-03T21:15:07.390",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated attacker can trigger a stack based buffer overflow in the DP Service (TCP port 3500). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111."
},
{
"lang": "es",
"value": "Un atacante no autenticado puede provocar un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en el servicio DP (puerto TCP 3500). Esta vulnerabilidad se ha resuelto en la versi\u00f3n de firmware 2.800.0000000.8.R.20241111."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@rapid7.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve@rapid7.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://github.com/sfewer-r7/LorexExploit",
"source": "cve@rapid7.com"
},
{
"url": "https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/",
"source": "cve@rapid7.com"
}
]
}