This vulnerability exists in Reedos aiM-Star version 2.0.1 due to missing restrictions for excessive failed authentication attempts on its API based login. A remote attacker could exploit this vulnerability by conducting a brute force attack against legitimate user passwords, which could lead to gain unauthorized access and compromise other user accounts.
History

Wed, 18 Sep 2024 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Reedos
Reedos aim-star
CPEs cpe:2.3:a:reedos:aim-star:2.0.1:*:*:*:*:*:*:*
Vendors & Products Reedos
Reedos aim-star
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 11 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Sep 2024 12:30:00 +0000

Type Values Removed Values Added
Description This vulnerability exists in Reedos aiM-Star version 2.0.1 due to missing restrictions for excessive failed authentication attempts on its API based login. A remote attacker could exploit this vulnerability by conducting a brute force attack against legitimate user passwords, which could lead to gain unauthorized access and compromise other user accounts.
Title User Enumeration vulnerability
Weaknesses CWE-307
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published: 2024-09-11T12:07:15.792Z

Updated: 2024-09-11T15:49:11.063Z

Reserved: 2024-09-09T11:02:56.323Z

Link: CVE-2024-45790

cve-icon Vulnrichment

Updated: 2024-09-11T15:49:05.772Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-11T13:15:03.290

Modified: 2024-09-18T18:38:04.393

Link: CVE-2024-45790

cve-icon Redhat

No data.