FKIE_CVE-2024-3263

Vulnerability from fkie_nvd - Published: 2024-05-14 15:40 - Updated: 2024-11-21 09:29
Severity ?
Summary
YMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions <= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.
Impacted products
Vendor Product Version

{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "YMS VIS Pro is an information system for veterinary and food administration, veterinarians and farm. Due to a combination of improper method for system credentials generation and weak password policy, passwords can be easily guessed and enumerated through brute force attacks. Successful attacks can lead to unauthorised access and execution of operations based on assigned user permissions. This vulnerability affects VIS Pro in versions \u003c= 3.3.0.6. This vulnerability has been mitigated by changes in authentication mechanisms and implementation of additional authentication layer and strong password policies.\n\n\n\n\n\n\n\n"
    },
    {
      "lang": "es",
      "value": "YMS VIS Pro es un sistema de informaci\u00f3n para administraci\u00f3n veterinaria y alimentaria, veterinarios y granjas. Debido a una combinaci\u00f3n de un m\u00e9todo inadecuado para la generaci\u00f3n de credenciales del sistema y una pol\u00edtica de contrase\u00f1as d\u00e9bil, las contrase\u00f1as se pueden adivinar y enumerar f\u00e1cilmente mediante ataques de fuerza bruta. Los ataques exitosos pueden conducir al acceso no autorizado y a la ejecuci\u00f3n de operaciones basadas en permisos de usuario asignados. Esta vulnerabilidad afecta a VIS Pro en versiones \u0026lt;= 3.3.0.6. Esta vulnerabilidad se ha mitigado mediante cambios en los mecanismos de autenticaci\u00f3n y la implementaci\u00f3n de una capa de autenticaci\u00f3n adicional y pol\u00edticas de contrase\u00f1as seguras."
    }
  ],
  "id": "CVE-2024-3263",
  "lastModified": "2024-11-21T09:29:16.350",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "incident@nbu.gov.sk",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-05-14T15:40:35.000",
  "references": [
    {
      "source": "incident@nbu.gov.sk",
      "url": "https://remediata.com/blog/cve-2024-3263-improper-authentication-in-yms-vis-pro/"
    },
    {
      "source": "incident@nbu.gov.sk",
      "url": "https://www.svps.sk/vis/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://remediata.com/blog/cve-2024-3263-improper-authentication-in-yms-vis-pro/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.svps.sk/vis/"
    }
  ],
  "sourceIdentifier": "incident@nbu.gov.sk",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        },
        {
          "lang": "en",
          "value": "CWE-521"
        }
      ],
      "source": "incident@nbu.gov.sk",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…