Lucene search

K
vulnrichmentCatoVULNRICHMENT:CVE-2024-6977
HistoryJul 31, 2024 - 4:56 p.m.

CVE-2024-6977 Cato Networks Windows SDP Client Sensitive data in trace logs can lead to account takeover

2024-07-3116:56:06
CWE-532
Cato
github.com
4
cato networks
windows
sdp client
vulnerability
account takeover
sensitive data leakage

CVSS3

6.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

AI Score

6.5

Confidence

High

EPSS

0

Percentile

9.4%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

A vulnerability in Cato Networks SDP Client on Windows allows the insertion of sensitive information into the log file, which can lead to an account takeover. However, the attack requires bypassing protections on modifying the tunnel token on a the attacker’s system.This issue affects SDP Client: before 5.10.34.

CNA Affected

[
  {
    "vendor": "Cato Networks",
    "product": "SDP Client",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "5.10.28",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "Windows"
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

6.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

AI Score

6.5

Confidence

High

EPSS

0

Percentile

9.4%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-6977