Insufficient validation performed on the REST API License file in Paxton Net2 before 6.07.14023.5015 (SR4) enables use of the REST API with an invalid License File. Attackers may be able to retrieve access-log data.
History

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Tue, 19 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Paxton-access
Paxton-access net2
Weaknesses CWE-922
CPEs cpe:2.3:a:paxton-access:net2:*:*:*:*:*:*:*:*
Vendors & Products Paxton-access
Paxton-access net2
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 13 Nov 2024 21:00:00 +0000


Mon, 11 Nov 2024 00:45:00 +0000

Type Values Removed Values Added
Description Insufficient validation performed on the REST API License file in Paxton Net2 before 6.07.14023.5015 (SR4) enables use of the REST API with an invalid License File. Attackers may be able to retrieve access-log data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-11-11T00:00:00

Updated: 2024-11-19T19:25:30.198Z

Reserved: 2024-10-09T00:00:00

Link: CVE-2024-48939

cve-icon Vulnrichment

Updated: 2024-11-11T01:30:17.693Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-11T01:15:04.890

Modified: 2024-11-21T09:41:13.860

Link: CVE-2024-48939

cve-icon Redhat

No data.