Products
Conduit
Source
cve@gitlab.com
Tags
CVE-2024-6299 details
Published : June 25, 2024, 1:15 p.m.
Last Modified : June 25, 2024, 6:50 p.m.
Last Modified : June 25, 2024, 6:50 p.m.
Description
Lack of consideration of key expiry when validating signatures in Conduit, allowing an attacker which has compromised an expired key to forge requests as the remote server, as well as PDUs with timestamps past the expiry date
CVSS Score
1 | 2 | 3 | 4.8 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-324 | Use of a Key Past its Expiration Date | The product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
Base Score
4.8
Exploitability Score
2.2
Impact Score
2.5
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
References
URL | Source |
---|---|
https://conduit.rs/changelog/#v0-8-0-2024-06-12 | cve@gitlab.com |
https://gitlab.com/famedly/conduit/-/releases/v0.8.0 | cve@gitlab.com |
This website uses the NVD API, but is not approved or certified by it.