Lucene search

K
cve[email protected]CVE-2024-0949
HistoryJun 27, 2024 - 10:15 a.m.

CVE-2024-0949

2024-06-2710:15:13
CWE-306
CWE-732
CWE-284
CWE-1390
CWE-863
CWE-923
CWE-862
web.nvd.nist.gov
12
improper access control
missing authorization
incorrect permission assignment
missing authentication
weak authentication
improper restriction of communication
incorrect configuration
file system manipulation
script injection
windows service modification
root certificate
intent spoof
webview exposure
data injection
incomplete data deletion
multi-tenant environment
install new service
modify existing service
install rootkit
replace file extension handlers
replace trusted executable
modify shared file
add malicious file
run software at logon
disable security software
cve-2024-0949

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.3%

Improper Access Control, Missing Authorization, Incorrect Authorization, Incorrect Permission Assignment for Critical Resource, Missing Authentication, Weak Authentication, Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Talya Informatics Elektraweb allows Exploiting Incorrectly Configured Access Control Security Levels, Manipulating Web Input to File System Calls, Embedding Scripts within Scripts, Malicious Logic Insertion, Modification of Windows Service Configuration, Malicious Root Certificate, Intent Spoof, WebView Exposure, Data Injected During Configuration, Incomplete Data Deletion in a Multi-Tenant Environment, Install New Service, Modify Existing Service, Install Rootkit, Replace File Extension Handlers, Replace Trusted Executable, Modify Shared File, Add Malicious File to Shared Webroot, Run Software at Logon, Disable Security Software.This issue affects Elektraweb: before v17.0.68.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Elektraweb",
    "vendor": "Talya Informatics",
    "versions": [
      {
        "lessThan": "v17.0.68",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.3%

Related for CVE-2024-0949