CVE-2024-4465

Sept. 11, 2024, 4:26 p.m.

Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Guardian/CMC

Source

prodsec@nozominetworks.com

Tags

CVE-2024-4465 details

Published : Sept. 11, 2024, 3:15 p.m.
Last Modified : Sept. 11, 2024, 4:26 p.m.

Description

An access control vulnerability was discovered in the Reports section due to a specific access restriction not being properly enforced for users with limited privileges. If a logged-in user with reporting privileges learns how to create a specific application request, they might be able to make limited changes to the reporting configuration. This could result in a partial loss of data integrity. In Guardian/CMC instances with a reporting configuration, there could be limited Denial of Service (DoS) impacts, as the reports may not reach their intended destination, and there could also be limited information disclosure impacts. Furthermore, modifying the destination SMTP server for the reports could lead to the compromise of external credentials, as they might be sent to an unauthorized server.

CVSS Score

1 2 3 4 5 6.0 7 8 9 10

Weakness

Weakness Name Description
CWE-863 Incorrect Authorization The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

Base Score

6.0

Exploitability Score

1.8

Impact Score

3.7

Base Severity

MEDIUM

References

URL Source
https://security.nozominetworks.com/NN-2024:2-01 prodsec@nozominetworks.com
This website uses the NVD API, but is not approved or certified by it.