Ant Media Server Community Edition in a default configuration is vulnerable to an improper HTTP header based authorization, leading to a possible use of non-administrative API calls reserved only for authorized users.  All versions up to 2.9.0 (tested) and possibly newer ones are believed to be vulnerable as the vendor has not confirmed releasing a patch.
History

Thu, 07 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 10 Oct 2024 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-863

Thu, 10 Oct 2024 15:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-302

cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published: 2024-05-13T08:19:13.882Z

Updated: 2024-11-07T15:16:53.084Z

Reserved: 2024-04-08T10:30:37.412Z

Link: CVE-2024-3462

cve-icon Vulnrichment

Updated: 2024-08-01T20:12:07.335Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-14T15:41:14.040

Modified: 2024-11-07T16:35:19.013

Link: CVE-2024-3462

cve-icon Redhat

No data.