Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 19 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Paxton-access
Paxton-access net2 |
|
Weaknesses | CWE-922 | |
CPEs | cpe:2.3:a:paxton-access:net2:*:*:*:*:*:*:*:* | |
Vendors & Products |
Paxton-access
Paxton-access net2 |
|
Metrics |
cvssV3_1
|
Wed, 13 Nov 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 11 Nov 2024 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Insufficient validation performed on the REST API License file in Paxton Net2 before 6.07.14023.5015 (SR4) enables use of the REST API with an invalid License File. Attackers may be able to retrieve access-log data. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-19T19:25:30.198Z
Reserved: 2024-10-09T00:00:00
Link: CVE-2024-48939

Updated: 2024-11-11T01:30:17.693Z

Status : Awaiting Analysis
Published: 2024-11-11T01:15:04.890
Modified: 2024-11-21T09:41:13.860
Link: CVE-2024-48939

No data.

No data.