Accounts enumeration vulnerability in the Login Component of Reolink Duo 2 WiFi Camera (Firmware Version v3.0.0.1889_23031701) allows remote attackers to determine valid user accounts via login attempts. This can lead to the enumeration of user accounts and potentially facilitate other attacks, such as brute-forcing of passwords. The vulnerability arises from the application responding differently to login attempts with valid and invalid usernames.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/rosembergpro/CVE-2024-48644 |
History
Wed, 23 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Reolink
Reolink duo 2 Wifi Camera Firmware |
|
Weaknesses | CWE-203 | |
CPEs | cpe:2.3:o:reolink:duo_2_wifi_camera_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Reolink
Reolink duo 2 Wifi Camera Firmware |
|
Metrics |
cvssV3_1
|
Tue, 22 Oct 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Accounts enumeration vulnerability in the Login Component of Reolink Duo 2 WiFi Camera (Firmware Version v3.0.0.1889_23031701) allows remote attackers to determine valid user accounts via login attempts. This can lead to the enumeration of user accounts and potentially facilitate other attacks, such as brute-forcing of passwords. The vulnerability arises from the application responding differently to login attempts with valid and invalid usernames. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-22T00:00:00
Updated: 2024-10-23T18:23:13.462Z
Reserved: 2024-10-08T00:00:00
Link: CVE-2024-48644
Vulnrichment
Updated: 2024-10-23T18:23:07.250Z
NVD
Status : Awaiting Analysis
Published: 2024-10-22T22:15:05.970
Modified: 2024-10-23T19:35:12.593
Link: CVE-2024-48644
Redhat
No data.