Lucene search

K
cvelistGitLabCVELIST:CVE-2024-6299
HistoryJun 25, 2024 - 1:02 p.m.

CVE-2024-6299 Use of a Key Past its Expiration Date in Conduit

2024-06-2513:02:25
CWE-324
GitLab
www.cve.org
3
cve-2024-6299
key expiry validation
conduit security

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

0.0004 Low

EPSS

Percentile

9.1%

Lack of consideration of key expiry when validating signatures in Conduit, allowing an attacker which has compromised an expired key to forge requests as the remote server, as well as PDUs with timestamps past the expiry date

CNA Affected

[
  {
    "vendor": "The Conduit Contributors",
    "product": "Conduit",
    "versions": [
      {
        "version": "0",
        "status": "affected",
        "lessThan": "0.8.0",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

0.0004 Low

EPSS

Percentile

9.1%

Related for CVELIST:CVE-2024-6299