Lucene search

K
cvelistNCSC.chCVELIST:CVE-2024-6203
HistoryAug 06, 2024 - 6:03 a.m.

CVE-2024-6203 HaloITSM - Password Reset Poisoning

2024-08-0606:03:11
CWE-640
NCSC.ch
www.cve.org
10
haloitsm
password reset poisoning
vulnerability
account takeover
cve-2024-6203

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

EPSS

0.001

Percentile

39.6%

HaloITSM versions up to 2.146.1 are affected by a Password Reset Poisoning vulnerability. Poisoned password reset links can be sent to existing HaloITSM users (given their email address is known). When these poisoned links get accessed (e.g. manually by the victim or automatically by an email client software), the password reset token is leaked to the malicious actor, allowing them to set a new password for the victim’s account.This potentially leads to account takeover attacks.HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "HaloITSM",
    "vendor": "Halo Service Solutions",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.146.1"
      }
    ]
  }
]

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

EPSS

0.001

Percentile

39.6%

Related for CVELIST:CVE-2024-6203