Local ABL Client bypass of the required PASOE security checks may allow an attacker to commit unauthorized code injection into Multi-Session Agents on supported OpenEdge LTS platforms up to OpenEdge LTS 11.7.18 and LTS 12.2.13 on all supported release platforms
History

Tue, 03 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Progress
Progress openedge
CPEs cpe:2.3:a:progress:openedge:*:*:*:*:*:*:*:*
Vendors & Products Progress
Progress openedge
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Sep 2024 15:00:00 +0000

Type Values Removed Values Added
Description Local ABL Client bypass of the required PASOE security checks may allow an attacker to commit unauthorized code injection into Multi-Session Agents on supported OpenEdge LTS platforms up to OpenEdge LTS 11.7.18 and LTS 12.2.13 on all supported release platforms
Title Direct local client connections to MS Agents can bypass authentication
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ProgressSoftware

Published: 2024-09-03T14:50:15.520Z

Updated: 2024-09-03T15:08:13.876Z

Reserved: 2024-07-31T17:32:09.678Z

Link: CVE-2024-7345

cve-icon Vulnrichment

Updated: 2024-09-03T15:08:08.132Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-03T15:15:16.707

Modified: 2024-09-05T14:11:00.493

Link: CVE-2024-7345

cve-icon Redhat

No data.