An issue was discovered in Logpoint before 7.5.0. SOAR uses a static JWT secret key to generate tokens that allow access to SOAR API endpoints without authentication. This static key vulnerability enables attackers to create custom JWT secret keys for unauthorized access to these endpoints.
History

Thu, 07 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-306
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 07 Nov 2024 17:00:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Logpoint before 7.5.0. SOAR uses a static JWT secret key to generate tokens that allow access to SOAR API endpoints without authentication. This static key vulnerability enables attackers to create custom JWT secret keys for unauthorized access to these endpoints.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-11-07T00:00:00

Updated: 2024-11-07T20:03:17.030Z

Reserved: 2024-10-10T00:00:00

Link: CVE-2024-48952

cve-icon Vulnrichment

Updated: 2024-11-07T20:03:07.991Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-07T17:15:08.510

Modified: 2024-11-08T19:01:03.880

Link: CVE-2024-48952

cve-icon Redhat

No data.