An issue was discovered in Logpoint before 7.5.0. SOAR uses a static JWT secret key to generate tokens that allow access to SOAR API endpoints without authentication. This static key vulnerability enables attackers to create custom JWT secret keys for unauthorized access to these endpoints.
Metrics
Affected Vendors & Products
References
History
Thu, 07 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-306 | |
Metrics |
cvssV3_1
|
Thu, 07 Nov 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in Logpoint before 7.5.0. SOAR uses a static JWT secret key to generate tokens that allow access to SOAR API endpoints without authentication. This static key vulnerability enables attackers to create custom JWT secret keys for unauthorized access to these endpoints. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-11-07T00:00:00
Updated: 2024-11-07T20:03:17.030Z
Reserved: 2024-10-10T00:00:00
Link: CVE-2024-48952
Vulnrichment
Updated: 2024-11-07T20:03:07.991Z
NVD
Status : Awaiting Analysis
Published: 2024-11-07T17:15:08.510
Modified: 2024-11-08T19:01:03.880
Link: CVE-2024-48952
Redhat
No data.