The login mechanism via device authentication of CGFIDO from Changing Information Technology has an Authentication Bypass vulnerability. If a user visits a forged website, the agent program deployed on their device will send an authentication signature to the website. An unauthenticated remote attacker who obtains this signature can use it to log into the system with any device.
History

Tue, 31 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 31 Dec 2024 01:45:00 +0000

Type Values Removed Values Added
Description The login mechanism via device authentication of CGFIDO from Changing Information Technology has an Authentication Bypass vulnerability. If a user visits a forged website, the agent program deployed on their device will send an authentication signature to the website. An unauthenticated remote attacker who obtains this signature can use it to log into the system with any device.
Title Changing Information Technology CGFIDO - Authentication Bypass
Weaknesses CWE-294
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published: 2024-12-31T01:32:11.422Z

Updated: 2024-12-31T15:56:18.203Z

Reserved: 2024-12-20T03:29:54.215Z

Link: CVE-2024-12839

cve-icon Vulnrichment

Updated: 2024-12-31T15:56:14.346Z

cve-icon NVD

Status : Received

Published: 2024-12-31T02:15:06.110

Modified: 2024-12-31T02:15:06.110

Link: CVE-2024-12839

cve-icon Redhat

No data.