A vulnerability in Kaiten version 57.131.12 and earlier allows attackers to bypass the PIN code authentication mechanism. The application requires users to input a 6-digit PIN code sent to their email for authorization after entering their login credentials. However, the request limiting mechanism can be easily bypassed, enabling attackers to perform a brute force attack to guess the correct PIN and gain unauthorized access to the application.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 01 Oct 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Kaiten
Kaiten kaiten
Weaknesses CWE-307
CPEs cpe:2.3:a:kaiten:kaiten:*:*:*:*:*:*:*:*
Vendors & Products Kaiten
Kaiten kaiten
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 01 Oct 2024 14:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in Kaiten version 57.131.12 and earlier allows attackers to bypass the PIN code authentication mechanism. The application requires users to input a 6-digit PIN code sent to their email for authorization after entering their login credentials. However, the request limiting mechanism can be easily bypassed, enabling attackers to perform a brute force attack to guess the correct PIN and gain unauthorized access to the application.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-01T14:49:47.454Z

Reserved: 2024-07-18T00:00:00

Link: CVE-2024-41276

cve-icon Vulnrichment

Updated: 2024-10-01T14:49:20.811Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-01T14:15:05.477

Modified: 2024-10-04T13:51:25.567

Link: CVE-2024-41276

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.