A vulnerability in Kaiten version 57.131.12 and earlier allows attackers to bypass the PIN code authentication mechanism. The application requires users to input a 6-digit PIN code sent to their email for authorization after entering their login credentials. However, the request limiting mechanism can be easily bypassed, enabling attackers to perform a brute force attack to guess the correct PIN and gain unauthorized access to the application.
History

Tue, 01 Oct 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Kaiten
Kaiten kaiten
Weaknesses CWE-307
CPEs cpe:2.3:a:kaiten:kaiten:*:*:*:*:*:*:*:*
Vendors & Products Kaiten
Kaiten kaiten
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 01 Oct 2024 14:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in Kaiten version 57.131.12 and earlier allows attackers to bypass the PIN code authentication mechanism. The application requires users to input a 6-digit PIN code sent to their email for authorization after entering their login credentials. However, the request limiting mechanism can be easily bypassed, enabling attackers to perform a brute force attack to guess the correct PIN and gain unauthorized access to the application.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-10-01T00:00:00

Updated: 2024-10-01T14:49:47.454Z

Reserved: 2024-07-18T00:00:00

Link: CVE-2024-41276

cve-icon Vulnrichment

Updated: 2024-10-01T14:49:20.811Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-01T14:15:05.477

Modified: 2024-10-04T13:51:25.567

Link: CVE-2024-41276

cve-icon Redhat

No data.