By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment.
Exploitation requires valid credentials and does not permit the attacker to bypass user privileges.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-50561 | The Client secret is not checked when using the OAuth Password grant type. By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment. Exploitation requires valid credentials and does not permit the attacker to bypass user privileges. |
Solution
Uninstall the Web Server: The OAuth web service is part of the Web Server for PcVue. If your system does not require the use of the Web & Mobile features, you should make sure not to install them. Update the Web Deployment Console (WDC) and re deploy the Web Server: Install a patched release of product, including the Web Deployment Console (WDC) and use the WDC to re-deploy the Web Server. Available patches: Fixed in: * PcVue 16.2.2
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.pcvue.com/security/security/#SB2024-4 |
|
Wed, 04 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Dec 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Client secret is not checked when using the OAuth Password grant type. By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment. Exploitation requires valid credentials and does not permit the attacker to bypass user privileges. | |
| Title | Client Secret not checked with OAuth Password grant type | |
| Weaknesses | CWE-358 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: arcinfo
Published:
Updated: 2024-12-04T15:00:50.503Z
Reserved: 2024-12-02T19:57:19.644Z
Link: CVE-2024-12056
Updated: 2024-12-04T14:49:18.428Z
Status : Received
Published: 2024-12-04T15:15:09.700
Modified: 2024-12-04T15:15:09.700
Link: CVE-2024-12056
No data.
OpenCVE Enrichment
Updated: 2025-07-12T16:01:34Z
EUVD