The Client secret is not checked when using the OAuth Password grant type.

By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment.
Exploitation requires valid credentials and does not permit the attacker to bypass user privileges.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-50561 The Client secret is not checked when using the OAuth Password grant type. By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment. Exploitation requires valid credentials and does not permit the attacker to bypass user privileges.
Fixes

Solution

Uninstall the Web Server: The OAuth web service is part of the Web Server for PcVue. If your system does not require the use of the Web & Mobile features, you should make sure not to install them. Update the Web Deployment Console (WDC) and re deploy the Web Server: Install a patched release of product, including the Web Deployment Console (WDC) and use the WDC to re-deploy the Web Server. Available patches: Fixed in: * PcVue 16.2.2


Workaround

No workaround given by the vendor.

History

Wed, 04 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Dec 2024 14:45:00 +0000

Type Values Removed Values Added
Description The Client secret is not checked when using the OAuth Password grant type. By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment. Exploitation requires valid credentials and does not permit the attacker to bypass user privileges.
Title Client Secret not checked with OAuth Password grant type
Weaknesses CWE-358
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/AU:N/R:U/RE:M/U:Green'}


cve-icon MITRE

Status: PUBLISHED

Assigner: arcinfo

Published:

Updated: 2024-12-04T15:00:50.503Z

Reserved: 2024-12-02T19:57:19.644Z

Link: CVE-2024-12056

cve-icon Vulnrichment

Updated: 2024-12-04T14:49:18.428Z

cve-icon NVD

Status : Received

Published: 2024-12-04T15:15:09.700

Modified: 2024-12-04T15:15:09.700

Link: CVE-2024-12056

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T16:01:34Z