First published: Fri Nov 22 2024(Updated: )
Logsign Unified SecOps Platform Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability. The specific flaw exists within the password reset mechanism. The issue results from the lack of restriction of excessive authentication attempts. An attacker can leverage this vulnerability to reset a user's password and bypass authentication on the system. Was ZDI-CAN-24164.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Logsign Unified SecOps Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5716 is classified as a high severity vulnerability due to the potential for remote attackers to bypass authentication.
To mitigate CVE-2024-5716, it is recommended to update the Logsign Unified SecOps Platform to the latest version provided by Logsign.
Organizations using the Logsign Unified SecOps Platform are vulnerable to CVE-2024-5716 if they have not applied the necessary updates.
Successful exploitation of CVE-2024-5716 allows unauthorized remote access to the Logsign Unified SecOps Platform, potentially compromising sensitive data.
No, CVE-2024-5716 allows remote attackers to bypass authentication, making it particularly dangerous.