2024-12-15 03:03:56 +00:00

68 lines
2.2 KiB
JSON

{
"id": "CVE-2024-50626",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-09T22:15:22.733",
"lastModified": "2024-12-12T02:06:32.817",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Digi ConnectPort LTS before 1.4.12. A Directory Traversal vulnerability exists in WebFS. This allows an attacker on the local area network to manipulate URLs to include traversal sequences, potentially leading to unauthorized access to data."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Digi ConnectPort LTS anterior a la versi\u00f3n 1.4.12. Existe una vulnerabilidad de Directory Traversal en WebFS. Esto permite que un atacante en la red de \u00e1rea local manipule las URL para incluir secuencias de recorrido, lo que puede provocar un acceso no autorizado a los datos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.digi.com/getattachment/Resources/Security/Alerts/Digi-ConnectPort-LTS-Firmware-Update/ConnectPort-LTS-KB.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.digi.com/resources/documentation/digidocs/pdfs/90001001.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.digi.com/resources/security",
"source": "cve@mitre.org"
}
]
}