By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment.
Exploitation requires valid credentials and does not permit the attacker to bypass user privileges.
No analysis available yet.
Vendor Solution
Uninstall the Web Server: The OAuth web service is part of the Web Server for PcVue. If your system does not require the use of the Web & Mobile features, you should make sure not to install them. Update the Web Deployment Console (WDC) and re deploy the Web Server: Install a patched release of product, including the Web Deployment Console (WDC) and use the WDC to re-deploy the Web Server. Available patches: Fixed in: * PcVue 16.2.2
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-50561 | The Client secret is not checked when using the OAuth Password grant type. By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment. Exploitation requires valid credentials and does not permit the attacker to bypass user privileges. |
| Link | Providers |
|---|---|
| https://www.pcvue.com/security/security/#SB2024-4 |
|
Wed, 04 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Dec 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Client secret is not checked when using the OAuth Password grant type. By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment. Exploitation requires valid credentials and does not permit the attacker to bypass user privileges. | |
| Title | Client Secret not checked with OAuth Password grant type | |
| Weaknesses | CWE-358 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: arcinfo
Published:
Updated: 2024-12-04T15:00:50.503Z
Reserved: 2024-12-02T19:57:19.644Z
Link: CVE-2024-12056
Updated: 2024-12-04T14:49:18.428Z
Status : Received
Published: 2024-12-04T15:15:09.700
Modified: 2024-12-04T15:15:09.700
Link: CVE-2024-12056
No data.
OpenCVE Enrichment
Updated: 2025-07-12T16:01:34Z
EUVD