First published: Tue Mar 05 2024(Updated: )
An issue in Teamwire Windows desktop client v.2.0.1 through v.2.4.0 allows a remote attacker to obtain sensitive information via a crafted payload to the message function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Teamwire | >=2.0.1<=2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24278 is classified as a high severity vulnerability due to the potential for sensitive information disclosure by remote attackers.
To remediate CVE-2024-24278, upgrade the Teamwire Windows desktop client to version 2.4.1 or later.
CVE-2024-24278 affects Teamwire Windows desktop client versions 2.0.1 through 2.4.0.
An attacker exploiting CVE-2024-24278 can obtain sensitive information via crafted payloads sent through the message function.
There are no recommended workarounds for CVE-2024-24278 other than upgrading to a secure version of the software.