Search criteria

2 vulnerabilities found for SecureCore Technology 4 by Phoenix

CVE-2024-12533 (GCVE-0-2024-12533)

Vulnerability from cvelistv5 – Published: 2025-05-13 14:56 – Updated: 2025-07-28 20:55
VLAI?
Summary
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.
CWE
  • CWE-754 - Improper Check for Unusual or Exceptional Conditions
Assigner
Impacted products
Vendor Product Version
Phoenix SecureCore Technology 4 Affected: 4.0.1.0 , < 4.0.1.1018 (custom)
Affected: 4.1.0.1 , < 4.1.0.573 (custom)
Affected: 4.2.0.1 , < 4.2.0.338 (custom)
Affected: 4.2.1.1 , < 4.2.1.300 (custom)
Affected: 4.3.0.1 , < 4.3.0.244 (custom)
Affected: 4.3.1.1 , < 4.3.1.187 (custom)
Affected: 4.4.0.1 , < 4.4.0.299 (custom)
Affected: 4.5.0.1 , < 4.5.0.231 (custom)
Affected: 4.5.1.1 , < 4.5.1.103 (custom)
Affected: 4.5.5.1 , < 4.5.5.36 (custom)
Affected: 4.6.0.1 , < 4.6.0.67 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-12533",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-13T15:15:02.413134Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-13T15:15:09.100Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SecureCore Technology 4",
          "vendor": "Phoenix",
          "versions": [
            {
              "lessThan": "4.0.1.1018",
              "status": "affected",
              "version": "4.0.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.1.0.573",
              "status": "affected",
              "version": "4.1.0.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.2.0.338",
              "status": "affected",
              "version": "4.2.0.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.2.1.300",
              "status": "affected",
              "version": "4.2.1.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.3.0.244",
              "status": "affected",
              "version": "4.3.0.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.3.1.187",
              "status": "affected",
              "version": "4.3.1.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.0.299",
              "status": "affected",
              "version": "4.4.0.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.5.0.231",
              "status": "affected",
              "version": "4.5.0.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.5.1.103",
              "status": "affected",
              "version": "4.5.1.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.5.5.36",
              "status": "affected",
              "version": "4.5.5.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.0.67",
              "status": "affected",
              "version": "4.6.0.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.\u003cp\u003eThis issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.\u003c/p\u003e"
            }
          ],
          "value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-754",
              "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-28T20:55:52.706Z",
        "orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
        "shortName": "Phoenix"
      },
      "references": [
        {
          "url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-12533/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
    "assignerShortName": "Phoenix",
    "cveId": "CVE-2024-12533",
    "datePublished": "2025-05-13T14:56:41.235Z",
    "dateReserved": "2024-12-11T17:37:28.103Z",
    "dateUpdated": "2025-07-28T20:55:52.706Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-12533 (GCVE-0-2024-12533)

Vulnerability from nvd – Published: 2025-05-13 14:56 – Updated: 2025-07-28 20:55
VLAI?
Summary
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.
CWE
  • CWE-754 - Improper Check for Unusual or Exceptional Conditions
Assigner
Impacted products
Vendor Product Version
Phoenix SecureCore Technology 4 Affected: 4.0.1.0 , < 4.0.1.1018 (custom)
Affected: 4.1.0.1 , < 4.1.0.573 (custom)
Affected: 4.2.0.1 , < 4.2.0.338 (custom)
Affected: 4.2.1.1 , < 4.2.1.300 (custom)
Affected: 4.3.0.1 , < 4.3.0.244 (custom)
Affected: 4.3.1.1 , < 4.3.1.187 (custom)
Affected: 4.4.0.1 , < 4.4.0.299 (custom)
Affected: 4.5.0.1 , < 4.5.0.231 (custom)
Affected: 4.5.1.1 , < 4.5.1.103 (custom)
Affected: 4.5.5.1 , < 4.5.5.36 (custom)
Affected: 4.6.0.1 , < 4.6.0.67 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-12533",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-13T15:15:02.413134Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-13T15:15:09.100Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SecureCore Technology 4",
          "vendor": "Phoenix",
          "versions": [
            {
              "lessThan": "4.0.1.1018",
              "status": "affected",
              "version": "4.0.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.1.0.573",
              "status": "affected",
              "version": "4.1.0.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.2.0.338",
              "status": "affected",
              "version": "4.2.0.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.2.1.300",
              "status": "affected",
              "version": "4.2.1.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.3.0.244",
              "status": "affected",
              "version": "4.3.0.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.3.1.187",
              "status": "affected",
              "version": "4.3.1.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.4.0.299",
              "status": "affected",
              "version": "4.4.0.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.5.0.231",
              "status": "affected",
              "version": "4.5.0.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.5.1.103",
              "status": "affected",
              "version": "4.5.1.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.5.5.36",
              "status": "affected",
              "version": "4.5.5.1",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.0.67",
              "status": "affected",
              "version": "4.6.0.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.\u003cp\u003eThis issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.\u003c/p\u003e"
            }
          ],
          "value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-754",
              "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-28T20:55:52.706Z",
        "orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
        "shortName": "Phoenix"
      },
      "references": [
        {
          "url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-12533/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
    "assignerShortName": "Phoenix",
    "cveId": "CVE-2024-12533",
    "datePublished": "2025-05-13T14:56:41.235Z",
    "dateReserved": "2024-12-11T17:37:28.103Z",
    "dateUpdated": "2025-07-28T20:55:52.706Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}