2024-12-08 03:06:42 +00:00

72 lines
2.2 KiB
JSON

{
"id": "CVE-2024-48939",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-11T01:15:04.890",
"lastModified": "2024-11-21T09:41:13.860",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient validation performed on the REST API License file in Paxton Net2 before 6.07.14023.5015 (SR4) enables use of the REST API with an invalid License File. Attackers may be able to retrieve access-log data."
},
{
"lang": "es",
"value": "La validaci\u00f3n insuficiente realizada en el archivo de licencia de la API REST en Paxton Net2 antes de la versi\u00f3n 6.07.14023.5015 (SR4) permite el uso de la API REST con un archivo de licencia no v\u00e1lido. Los atacantes podr\u00edan recuperar datos del registro de acceso."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://github.com/gitaware/CVE/blob/main/CVE-2024-48939/20241020_vuln_discl_paxton_API_license.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://paxton-access.co.uk",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2024/Oct/3",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Oct/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}