Lucene search

K
vulnrichmentIcscertVULNRICHMENT:CVE-2024-33625
HistoryMay 15, 2024 - 7:19 p.m.

CVE-2024-33625 CyberPower PowerPanel business Use of Hard-coded Password

2024-05-1519:19:53
CWE-259
icscert
github.com
cyberpower
powerpanel
jwt
signing key
authentication
cve

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

CyberPower PowerPanel business
application code contains a hard-coded JWT signing key. This could
result in an attacker forging JWT tokens to bypass authentication.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "PowerPanel business",
    "vendor": "CyberPower",
    "versions": [
      {
        "lessThan": "4.9.0",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

Related for VULNRICHMENT:CVE-2024-33625