First published: Wed Feb 28 2024(Updated: )
F-logic DataCube3 v1.0 is vulnerable to Incorrect Access Control due to an improper directory access restriction. An unauthenticated, remote attacker can exploit this, by sending a URI that contains the path of the configuration file. A successful exploit could allow the attacker to extract the root and admin password.
Credit: cve@mitre.org Samy Younsi - NS Labs
Affected Software | Affected Version | How to fix |
---|---|---|
F-logic Datacube3 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25830 is classified as a high severity vulnerability due to the potential for unauthorized access to sensitive configuration files.
To remediate CVE-2024-25830, implement stricter access controls and validate user permissions for accessing file directories.
CVE-2024-25830 affects users of F-logic DataCube3 v1.0 that do not have proper access controls in place.
Yes, CVE-2024-25830 can be exploited remotely by an unauthenticated attacker who sends malicious URIs.
An attacker exploiting CVE-2024-25830 could potentially extract sensitive configuration information from the affected system.