The sessions are stored in clear-text logs. An attacker can retrieve authentication sessions. A remote attacker can retrieve the credentials and bypass the authentication mechanism. As for the affected products/models/versions, see the reference URL.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Toshiba

Published: 2024-06-14T03:22:31.415Z

Updated: 2024-08-02T00:27:59.245Z

Reserved: 2024-02-21T02:11:56.735Z

Link: CVE-2024-27157

cve-icon Vulnrichment

Updated: 2024-08-02T00:27:59.245Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-14T04:15:26.607

Modified: 2024-07-04T05:15:12.943

Link: CVE-2024-27157

cve-icon Redhat

No data.