CVE-2024-3263 (GCVE-0-2024-3263)

Vulnerability from cvelistv5 – Published: 2024-05-13 09:17 – Updated: 2024-08-01 20:05
VLAI?
Summary
YMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions <= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.
CWE
  • CWE-521 - Weak Password Requirements
  • CWE-287 - Improper Authentication
Assigner
Impacted products
Vendor Product Version
YMS VIS Pro Affected: 0 , ≤ 3.3.0.6 (custom)
Create a notification for this product.
Credits
REMEDIATA (support@remediata.com)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:yms:vis_pro:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vis_pro",
            "vendor": "yms",
            "versions": [
              {
                "lessThanOrEqual": "3.3.0.6",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-3263",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-13T15:37:29.443030Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-06T17:24:49.410Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:05:08.248Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.svps.sk/vis/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://remediata.com/blog/cve-2024-3263-improper-authentication-in-yms-vis-pro/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VIS Pro",
          "vendor": "YMS",
          "versions": [
            {
              "lessThanOrEqual": "3.3.0.6",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "REMEDIATA (support@remediata.com)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cp\u003eYMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions \u0026lt;= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e"
            }
          ],
          "value": "YMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions \u003c= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.\n\n\n\n\n\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-112",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-112 Brute Force"
            }
          ]
        },
        {
          "capecId": "CAPEC-49",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-49 Password Brute Forcing"
            }
          ]
        },
        {
          "capecId": "CAPEC-114",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-114 Authentication Abuse"
            }
          ]
        },
        {
          "capecId": "CAPEC-16",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-16 Dictionary-based Password Attack"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-521",
              "description": "CWE-521 Weak Password Requirements",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "CWE-287 Improper Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-13T09:17:12.216Z",
        "orgId": "bc375322-d3d7-4481-b261-e29662236cfd",
        "shortName": "SK-CERT"
      },
      "references": [
        {
          "url": "https://www.svps.sk/vis/"
        },
        {
          "url": "https://remediata.com/blog/cve-2024-3263-improper-authentication-in-yms-vis-pro/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2024-02-25T22:53:00.000Z",
          "value": "Vulnerability reported to SK-CERT"
        },
        {
          "lang": "en",
          "time": "2024-02-26T12:12:00.000Z",
          "value": "Developer and system operator notified by SK-CERT"
        },
        {
          "lang": "en",
          "time": "2024-02-27T15:10:00.000Z",
          "value": "Vulnerability confirmed by system operator"
        },
        {
          "lang": "en",
          "time": "2024-04-17T14:18:00.000Z",
          "value": "Developer and system operator confirmed vulnerability fix"
        }
      ],
      "title": "Improper authentication in YMS VIS Pro",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bc375322-d3d7-4481-b261-e29662236cfd",
    "assignerShortName": "SK-CERT",
    "cveId": "CVE-2024-3263",
    "datePublished": "2024-05-13T09:17:12.216Z",
    "dateReserved": "2024-04-03T11:57:41.321Z",
    "dateUpdated": "2024-08-01T20:05:08.248Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"YMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions \u003c= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.\\n\\n\\n\\n\\n\\n\\n\\n\"}, {\"lang\": \"es\", \"value\": \"YMS VIS Pro es un sistema de informaci\\u00f3n para administraci\\u00f3n veterinaria y alimentaria, veterinarios y granjas. Debido a una combinaci\\u00f3n de un m\\u00e9todo inadecuado para la generaci\\u00f3n de credenciales del sistema y una pol\\u00edtica de contrase\\u00f1as d\\u00e9bil, las contrase\\u00f1as se pueden adivinar y enumerar f\\u00e1cilmente mediante ataques de fuerza bruta. Los ataques exitosos pueden conducir al acceso no autorizado y a la ejecuci\\u00f3n de operaciones basadas en permisos de usuario asignados. Esta vulnerabilidad afecta a VIS Pro en versiones \u0026lt;= 3.3.0.6. Esta vulnerabilidad se ha mitigado mediante cambios en los mecanismos de autenticaci\\u00f3n y la implementaci\\u00f3n de una capa de autenticaci\\u00f3n adicional y pol\\u00edticas de contrase\\u00f1as seguras.\"}]",
      "id": "CVE-2024-3263",
      "lastModified": "2024-11-21T09:29:16.350",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"incident@nbu.gov.sk\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}]}",
      "published": "2024-05-14T15:40:35.000",
      "references": "[{\"url\": \"https://remediata.com/blog/cve-2024-3263-improper-authentication-in-yms-vis-pro/\", \"source\": \"incident@nbu.gov.sk\"}, {\"url\": \"https://www.svps.sk/vis/\", \"source\": \"incident@nbu.gov.sk\"}, {\"url\": \"https://remediata.com/blog/cve-2024-3263-improper-authentication-in-yms-vis-pro/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.svps.sk/vis/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "incident@nbu.gov.sk",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"incident@nbu.gov.sk\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}, {\"lang\": \"en\", \"value\": \"CWE-521\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-3263\",\"sourceIdentifier\":\"incident@nbu.gov.sk\",\"published\":\"2024-05-14T15:40:35.000\",\"lastModified\":\"2024-11-21T09:29:16.350\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"YMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions \u003c= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.\\n\\n\\n\\n\\n\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"YMS VIS Pro es un sistema de informaci\u00f3n para administraci\u00f3n veterinaria y alimentaria, veterinarios y granjas. Debido a una combinaci\u00f3n de un m\u00e9todo inadecuado para la generaci\u00f3n de credenciales del sistema y una pol\u00edtica de contrase\u00f1as d\u00e9bil, las contrase\u00f1as se pueden adivinar y enumerar f\u00e1cilmente mediante ataques de fuerza bruta. Los ataques exitosos pueden conducir al acceso no autorizado y a la ejecuci\u00f3n de operaciones basadas en permisos de usuario asignados. Esta vulnerabilidad afecta a VIS Pro en versiones \u0026lt;= 3.3.0.6. Esta vulnerabilidad se ha mitigado mediante cambios en los mecanismos de autenticaci\u00f3n y la implementaci\u00f3n de una capa de autenticaci\u00f3n adicional y pol\u00edticas de contrase\u00f1as seguras.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"incident@nbu.gov.sk\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"incident@nbu.gov.sk\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"},{\"lang\":\"en\",\"value\":\"CWE-521\"}]}],\"references\":[{\"url\":\"https://remediata.com/blog/cve-2024-3263-improper-authentication-in-yms-vis-pro/\",\"source\":\"incident@nbu.gov.sk\"},{\"url\":\"https://www.svps.sk/vis/\",\"source\":\"incident@nbu.gov.sk\"},{\"url\":\"https://remediata.com/blog/cve-2024-3263-improper-authentication-in-yms-vis-pro/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.svps.sk/vis/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.svps.sk/vis/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://remediata.com/blog/cve-2024-3263-improper-authentication-in-yms-vis-pro/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T20:05:08.248Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-3263\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-13T15:37:29.443030Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:yms:vis_pro:*:*:*:*:*:*:*:*\"], \"vendor\": \"yms\", \"product\": \"vis_pro\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"3.3.0.6\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-13T15:40:57.731Z\"}}], \"cna\": {\"title\": \"Improper authentication in YMS VIS Pro\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"REMEDIATA (support@remediata.com)\"}], \"impacts\": [{\"capecId\": \"CAPEC-112\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-112 Brute Force\"}]}, {\"capecId\": \"CAPEC-49\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-49 Password Brute Forcing\"}]}, {\"capecId\": \"CAPEC-114\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-114 Authentication Abuse\"}]}, {\"capecId\": \"CAPEC-16\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-16 Dictionary-based Password Attack\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"YMS\", \"product\": \"VIS Pro\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"3.3.0.6\"}], \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2024-02-25T22:53:00.000Z\", \"value\": \"Vulnerability reported to SK-CERT\"}, {\"lang\": \"en\", \"time\": \"2024-02-26T12:12:00.000Z\", \"value\": \"Developer and system operator notified by SK-CERT\"}, {\"lang\": \"en\", \"time\": \"2024-02-27T15:10:00.000Z\", \"value\": \"Vulnerability confirmed by system operator\"}, {\"lang\": \"en\", \"time\": \"2024-04-17T14:18:00.000Z\", \"value\": \"Developer and system operator confirmed vulnerability fix\"}], \"references\": [{\"url\": \"https://www.svps.sk/vis/\"}, {\"url\": \"https://remediata.com/blog/cve-2024-3263-improper-authentication-in-yms-vis-pro/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"YMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions \u003c= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.\\n\\n\\n\\n\\n\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cp\u003eYMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions \u0026lt;= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-521\", \"description\": \"CWE-521 Weak Password Requirements\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-287\", \"description\": \"CWE-287 Improper Authentication\"}]}], \"providerMetadata\": {\"orgId\": \"bc375322-d3d7-4481-b261-e29662236cfd\", \"shortName\": \"SK-CERT\", \"dateUpdated\": \"2024-05-13T09:17:12.216Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-3263\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T20:05:08.248Z\", \"dateReserved\": \"2024-04-03T11:57:41.321Z\", \"assignerOrgId\": \"bc375322-d3d7-4481-b261-e29662236cfd\", \"datePublished\": \"2024-05-13T09:17:12.216Z\", \"assignerShortName\": \"SK-CERT\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…