OMFLOW from The SYSCOM Group does not properly restrict access to the system settings modification functionality, allowing remote attackers with regular privileges to update system settings or create accounts with administrator privileges, thereby gaining control of the server.
History

Tue, 17 Sep 2024 11:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-Other

Mon, 16 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Syscomgo
Syscomgo omflow
CPEs cpe:2.3:a:syscomgo:omflow:*:*:*:*:*:*:*:*
Vendors & Products Syscomgo
Syscomgo omflow
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Sep 2024 06:00:00 +0000

Type Values Removed Values Added
Description OMFLOW from The SYSCOM Group does not properly restrict access to the system settings modification functionality, allowing remote attackers with regular privileges to update system settings or create accounts with administrator privileges, thereby gaining control of the server.
Title The SYSCOM Group OMFLOW - Broken Access Control
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published: 2024-09-16T05:51:45.255Z

Updated: 2024-09-16T13:52:19.224Z

Reserved: 2024-09-13T09:43:48.582Z

Link: CVE-2024-8779

cve-icon Vulnrichment

Updated: 2024-09-16T13:52:13.658Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-16T06:15:12.063

Modified: 2024-09-17T11:27:50.290

Link: CVE-2024-8779

cve-icon Redhat

No data.