Kerlink gateways running KerOS prior to version 5.10 expose their web interface exclusively over HTTP, without HTTPS support. This lack of transport layer security allows a man-in-the-middle attacker to intercept and modify traffic between the client and the device.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 01 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Kerlink
Kerlink keros
Vendors & Products Kerlink
Kerlink keros

Mon, 01 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-319
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 01 Dec 2025 15:45:00 +0000

Type Values Removed Values Added
Description Kerlink gateways running KerOS prior to version 5.10 expose their web interface exclusively over HTTP, without HTTPS support. This lack of transport layer security allows a man-in-the-middle attacker to intercept and modify traffic between the client and the device.
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AC:H/AV:N/A:N/C:H/I:H/PR:N/S:U/UI:R'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-01T16:13:32.231Z

Reserved: 2024-04-12T00:00:00.000Z

Link: CVE-2024-32384

cve-icon Vulnrichment

Updated: 2025-12-01T16:12:39.882Z

cve-icon NVD

Status : Received

Published: 2025-12-01T16:15:49.217

Modified: 2025-12-01T17:15:47.650

Link: CVE-2024-32384

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-01T21:27:18Z