Lucene search

K
cveTalosCVE-2024-27201
HistoryApr 03, 2024 - 2:15 p.m.

CVE-2024-27201

2024-04-0314:15:17
CWE-20
talos
web.nvd.nist.gov
37
insecure input validation
oas platform
network requests
vulnerability

CVSS3

4.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

AI Score

5.8

Confidence

High

EPSS

0

Percentile

14.0%

An improper input validation vulnerability exists in the OAS Engine User Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to unexpected data in the configuration. An attacker can send a sequence of requests to trigger this vulnerability.

Affected configurations

Vulners
Node
openautomationsoftwareoas_platformRangeV19.00.0057
VendorProductVersionCPE
openautomationsoftwareoas_platform*cpe:2.3:a:openautomationsoftware:oas_platform:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Open Automation Software",
    "product": "OAS Platform",
    "versions": [
      {
        "version": "V19.00.0057",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

AI Score

5.8

Confidence

High

EPSS

0

Percentile

14.0%