OMFLOW from The SYSCOM Group does not properly restrict access to the system settings modification functionality, allowing remote attackers with regular privileges to update system settings or create accounts with administrator privileges, thereby gaining control of the server.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Sep 2024 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-Other |
Mon, 16 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Syscomgo
Syscomgo omflow |
|
CPEs | cpe:2.3:a:syscomgo:omflow:*:*:*:*:*:*:*:* | |
Vendors & Products |
Syscomgo
Syscomgo omflow |
|
Metrics |
ssvc
|
Mon, 16 Sep 2024 06:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OMFLOW from The SYSCOM Group does not properly restrict access to the system settings modification functionality, allowing remote attackers with regular privileges to update system settings or create accounts with administrator privileges, thereby gaining control of the server. | |
Title | The SYSCOM Group OMFLOW - Broken Access Control | |
Weaknesses | CWE-284 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: twcert
Published: 2024-09-16T05:51:45.255Z
Updated: 2024-09-16T13:52:19.224Z
Reserved: 2024-09-13T09:43:48.582Z
Link: CVE-2024-8779
Vulnrichment
Updated: 2024-09-16T13:52:13.658Z
NVD
Status : Analyzed
Published: 2024-09-16T06:15:12.063
Modified: 2024-09-17T11:27:50.290
Link: CVE-2024-8779
Redhat
No data.