Lucene search

K
cvelistTR-CERTCVELIST:CVE-2024-0949
HistoryJun 27, 2024 - 9:36 a.m.

CVE-2024-0949 Improper Access Control in Talya Informatics' Elektraweb

2024-06-2709:36:59
CWE-923
CWE-284
CWE-862
CWE-732
CWE-863
CWE-306
CWE-1390
TR-CERT
www.cve.org
3
elektraweb
talya informatics
access control
authorization
authentication
communication channel
web input
file system
root certificate
windows service configuration
intent spoof
webview exposure
data injection
multi-tenant environment
rootkit
security software.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

39.3%

Improper Access Control, Missing Authorization, Incorrect Authorization, Incorrect Permission Assignment for Critical Resource, Missing Authentication, Weak Authentication, Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Talya Informatics Elektraweb allows Exploiting Incorrectly Configured Access Control Security Levels, Manipulating Web Input to File System Calls, Embedding Scripts within Scripts, Malicious Logic Insertion, Modification of Windows Service Configuration, Malicious Root Certificate, Intent Spoof, WebView Exposure, Data Injected During Configuration, Incomplete Data Deletion in a Multi-Tenant Environment, Install New Service, Modify Existing Service, Install Rootkit, Replace File Extension Handlers, Replace Trusted Executable, Modify Shared File, Add Malicious File to Shared Webroot, Run Software at Logon, Disable Security Software.This issue affects Elektraweb: before v17.0.68.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Elektraweb",
    "vendor": "Talya Informatics",
    "versions": [
      {
        "lessThan": "v17.0.68",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

39.3%

Related for CVELIST:CVE-2024-0949