FKIE_CVE-2024-0313

Vulnerability from fkie_nvd - Published: 2024-03-14 09:15 - Updated: 2024-11-21 08:46
Summary
A malicious insider exploiting this vulnerability can circumvent existing security controls put in place by the organization. On the contrary, if the victim is legitimately using the temporary bypass to reach out to the Internet for retrieving application and system updates, a remote device could target it and undo the bypass, thereby denying the victim access to the update service, causing it to fail.
Impacted products
Vendor Product Version

{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A malicious insider exploiting this vulnerability can circumvent existing security controls put in place by the organization. On the contrary, if the victim is legitimately using the temporary bypass to reach out to the Internet for retrieving application and system updates, a remote device could target it and undo the bypass, thereby denying the victim access to the update service, causing it to fail. "
    },
    {
      "lang": "es",
      "value": "Un usuario interno malicioso que aproveche esta vulnerabilidad puede eludir los controles de seguridad existentes implementados por la organizaci\u00f3n. Por el contrario, si la v\u00edctima est\u00e1 utilizando leg\u00edtimamente la omisi\u00f3n temporal para acceder a Internet para recuperar aplicaciones y actualizaciones del sistema, un dispositivo remoto podr\u00eda apuntar a ella y deshacer la omisi\u00f3n, neg\u00e1ndole as\u00ed a la v\u00edctima el acceso al servicio de actualizaci\u00f3n, provocando que fallar."
    }
  ],
  "id": "CVE-2024-0313",
  "lastModified": "2024-11-21T08:46:18.200",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "trellixpsirt@trellix.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-03-14T09:15:47.153",
  "references": [
    {
      "source": "trellixpsirt@trellix.com",
      "url": "https://kcm.trellix.com/corporate/index?page=content\u0026id=SB10418"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://kcm.trellix.com/corporate/index?page=content\u0026id=SB10418"
    }
  ],
  "sourceIdentifier": "trellixpsirt@trellix.com",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-670"
        }
      ],
      "source": "trellixpsirt@trellix.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…