Description
A vulnerability in Kaiten version 57.131.12 and earlier allows attackers to bypass the PIN code authentication mechanism. The application requires users to input a 6-digit PIN code sent to their email for authorization after entering their login credentials. However, the request limiting mechanism can be easily bypassed, enabling attackers to perform a brute force attack to guess the correct PIN and gain unauthorized access to the application.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Tue, 01 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kaiten
Kaiten kaiten |
|
| Weaknesses | CWE-307 | |
| CPEs | cpe:2.3:a:kaiten:kaiten:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Kaiten
Kaiten kaiten |
|
| Metrics |
cvssV3_1
|
Tue, 01 Oct 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in Kaiten version 57.131.12 and earlier allows attackers to bypass the PIN code authentication mechanism. The application requires users to input a 6-digit PIN code sent to their email for authorization after entering their login credentials. However, the request limiting mechanism can be easily bypassed, enabling attackers to perform a brute force attack to guess the correct PIN and gain unauthorized access to the application. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-01T14:49:47.454Z
Reserved: 2024-07-18T00:00:00.000Z
Link: CVE-2024-41276
Updated: 2024-10-01T14:49:20.811Z
Status : Awaiting Analysis
Published: 2024-10-01T14:15:05.477
Modified: 2024-10-04T13:51:25.567
Link: CVE-2024-41276
No data.
OpenCVE Enrichment
No data.
Weaknesses