Today > | 1 Medium vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-39398

Aug. 14, 2024, 2:47 p.m.

CVSS Score

7.4 / 10

Products Impacted

Vendor Product Versions
adobe
  • commerce
  • magento
  • *, 2.4.4, 2.4.5, 2.4.6, 2.4.7
  • *, 2.4.4, 2.4.5, 2.4.6, 2.4.7

Description

Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Restriction of Excessive Authentication Attempts vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability to perform brute force attacks and potentially gain unauthorized access to accounts. Exploitation of this issue does not require user interaction, but attack complexity is high.

Weaknesses

CWE-307
Improper Restriction of Excessive Authentication Attempts

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks.

CWE ID: 307

Date

Published: Aug. 14, 2024, 12:15 p.m.

Last Modified: Aug. 14, 2024, 2:47 p.m.

Status : Analyzed

CVE is currently being analyzed by NVD staff, this process results in association of reference link tags, CVSS scores, CWE association, and CPE applicability statements.

More info

Source

psirt@adobe.com

CPEs

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a adobe commerce / / / / / / / /
a adobe commerce 2.4.4 - / / / / / /
a adobe commerce 2.4.4 p1 / / / / / /
a adobe commerce 2.4.4 p2 / / / / / /
a adobe commerce 2.4.4 p3 / / / / / /
a adobe commerce 2.4.4 p4 / / / / / /
a adobe commerce 2.4.4 p5 / / / / / /
a adobe commerce 2.4.4 p6 / / / / / /
a adobe commerce 2.4.4 p7 / / / / / /
a adobe commerce 2.4.4 p8 / / / / / /
a adobe commerce 2.4.4 p9 / / / / / /
a adobe commerce 2.4.5 - / / / / / /
a adobe commerce 2.4.5 p1 / / / / / /
a adobe commerce 2.4.5 p2 / / / / / /
a adobe commerce 2.4.5 p3 / / / / / /
a adobe commerce 2.4.5 p4 / / / / / /
a adobe commerce 2.4.5 p5 / / / / / /
a adobe commerce 2.4.5 p6 / / / / / /
a adobe commerce 2.4.5 p7 / / / / / /
a adobe commerce 2.4.5 p8 / / / / / /
a adobe commerce 2.4.6 - / / / / / /
a adobe commerce 2.4.6 p1 / / / / / /
a adobe commerce 2.4.6 p2 / / / / / /
a adobe commerce 2.4.6 p3 / / / / / /
a adobe commerce 2.4.6 p4 / / / / / /
a adobe commerce 2.4.6 p5 / / / / / /
a adobe commerce 2.4.6 p6 / / / / / /
a adobe commerce 2.4.7 - / / / / / /
a adobe commerce 2.4.7 b1 / / / / / /
a adobe commerce 2.4.7 b2 / / / / / /
a adobe commerce 2.4.7 p1 / / / / / /
a adobe magento / / / / open_source / / /
a adobe magento 2.4.4 - / / open_source / / /
a adobe magento 2.4.4 p1 / / open_source / / /
a adobe magento 2.4.4 p2 / / open_source / / /
a adobe magento 2.4.4 p3 / / open_source / / /
a adobe magento 2.4.4 p4 / / open_source / / /
a adobe magento 2.4.4 p5 / / open_source / / /
a adobe magento 2.4.4 p6 / / open_source / / /
a adobe magento 2.4.4 p7 / / open_source / / /
a adobe magento 2.4.4 p8 / / open_source / / /
a adobe magento 2.4.4 p9 / / open_source / / /
a adobe magento 2.4.5 - / / open_source / / /
a adobe magento 2.4.5 p1 / / open_source / / /
a adobe magento 2.4.5 p2 / / open_source / / /
a adobe magento 2.4.5 p3 / / open_source / / /
a adobe magento 2.4.5 p4 / / open_source / / /
a adobe magento 2.4.5 p5 / / open_source / / /
a adobe magento 2.4.5 p6 / / open_source / / /
a adobe magento 2.4.5 p7 / / open_source / / /
a adobe magento 2.4.5 p8 / / open_source / / /
a adobe magento 2.4.6 - / / open_source / / /
a adobe magento 2.4.6 p1 / / open_source / / /
a adobe magento 2.4.6 p2 / / open_source / / /
a adobe magento 2.4.6 p3 / / open_source / / /
a adobe magento 2.4.6 p4 / / open_source / / /
a adobe magento 2.4.6 p5 / / open_source / / /
a adobe magento 2.4.6 p6 / / open_source / / /
a adobe magento 2.4.7 - / / open_source / / /
a adobe magento 2.4.7 b1 / / open_source / / /
a adobe magento 2.4.7 b2 / / open_source / / /
a adobe magento 2.4.7 p1 / / open_source / / /

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

Base Score
7.4
Exploitability Score
2.2
Impact Score
5.2
Base Severity
HIGH
CVSS Vector String

The CVSS vector string provides an in-depth view of the vulnerability metrics.

View Vector String

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

References