Ecosystem Agent version 4 < 4.5.1.2597 and Ecosystem Agent version 5 < 5.1.4.2473 did not properly validate SSL/TLS certificates, which could allow a malicious actor to perform a Man-in-the-Middle and intercept traffic between the agent and N-able servers from a privileged network position.
History

Fri, 09 Aug 2024 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Aug 2024 22:15:00 +0000

Type Values Removed Values Added
Description Ecosystem Agent version 4 < 4.5.1.2597 and Ecosystem Agent version 5 < 5.1.4.2473 did not properly validate SSL/TLS certificates, which could allow a malicious actor to perform a Man-in-the-Middle and intercept traffic between the agent and N-able servers from a privileged network position.
Title Ecosystem Agent Insufficient Transport Layer Security
Weaknesses CWE-295
References
Metrics cvssV3_1

{'score': 3.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: N-able

Published: 2024-08-08T22:04:11.534Z

Updated: 2024-08-09T19:20:08.170Z

Reserved: 2024-05-28T19:46:11.262Z

Link: CVE-2024-5445

cve-icon Vulnrichment

Updated: 2024-08-09T19:20:04.944Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-12T13:38:37.157

Modified: 2024-08-12T13:41:36.517

Link: CVE-2024-5445

cve-icon Redhat

No data.