First published: Fri Nov 01 2024(Updated: )
Yealink Meeting Server before V26.0.0.67 allows attackers to obtain static key information from a front-end JS file and decrypt the plaintext passwords based on the obtained key information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yealink Meeting Server | <26.0.0.67 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48353 is rated as high severity due to its potential to expose sensitive information.
To fix CVE-2024-48353, upgrade Yealink Meeting Server to version 26.0.0.67 or later.
Yealink Meeting Server versions prior to 26.0.0.67 are affected by CVE-2024-48353.
Attackers can obtain static key information and decrypt plaintext passwords from the front-end JS file due to CVE-2024-48353.
Yes, vulnerabilities like CVE-2024-48353 are typically disclosed through security advisories by the vendor, such as Yealink.