Logsign Unified SecOps Platform HTTP API Hard-coded Cryptographic Key Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the HTTP API. The issue results from using a hard-coded cryptographic key. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24170.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Logsign
Logsign unified Secops |
|
CPEs | cpe:2.3:a:logsign:unified_secops:*:*:*:*:*:*:*:* | |
Vendors & Products |
Logsign
Logsign unified Secops |
|
Metrics |
ssvc
|
Fri, 22 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Logsign Unified SecOps Platform HTTP API Hard-coded Cryptographic Key Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HTTP API. The issue results from using a hard-coded cryptographic key. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24170. | |
Title | Logsign Unified SecOps Platform HTTP API Hard-coded Cryptographic Key Remote Code Execution Vulnerability | |
Weaknesses | CWE-321 | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: zdi
Published: 2024-11-22T20:05:34.629Z
Updated: 2024-11-26T15:57:55.888Z
Reserved: 2024-06-06T23:09:37.208Z
Link: CVE-2024-5722
Vulnrichment
Updated: 2024-11-25T17:28:58.528Z
NVD
Status : Received
Published: 2024-11-22T20:15:10.787
Modified: 2024-11-22T20:15:10.787
Link: CVE-2024-5722
Redhat
No data.