The login mechanism via device authentication of CGFIDO from Changing Information Technology has an Authentication Bypass vulnerability. If a user visits a forged website, the agent program deployed on their device will send an authentication signature to the website. An unauthenticated remote attacker who obtains this signature can use it to log into the system with any device.
Metrics
Affected Vendors & Products
References
History
Tue, 31 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 31 Dec 2024 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The login mechanism via device authentication of CGFIDO from Changing Information Technology has an Authentication Bypass vulnerability. If a user visits a forged website, the agent program deployed on their device will send an authentication signature to the website. An unauthenticated remote attacker who obtains this signature can use it to log into the system with any device. | |
Title | Changing Information Technology CGFIDO - Authentication Bypass | |
Weaknesses | CWE-294 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: twcert
Published: 2024-12-31T01:32:11.422Z
Updated: 2024-12-31T15:56:18.203Z
Reserved: 2024-12-20T03:29:54.215Z
Link: CVE-2024-12839
Vulnrichment
Updated: 2024-12-31T15:56:14.346Z
NVD
Status : Received
Published: 2024-12-31T02:15:06.110
Modified: 2024-12-31T02:15:06.110
Link: CVE-2024-12839
Redhat
No data.