First published: Wed Aug 21 2024(Updated: )
Logsign Unified SecOps Platform Incorrect Authorization Authentication Bypass Vulnerability. This vulnerability allows local attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability. The specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of the user's license expiration date. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-25029.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Logsign Unified SecOps Platform | ||
Logsign Unified SecOps Platform | =6.4.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7604 is classified as a high severity vulnerability due to its ability to allow local attackers to bypass authentication.
To fix CVE-2024-7604, users should update to the latest version of Logsign Unified SecOps Platform that addresses this vulnerability.
CVE-2024-7604 affects installations of Logsign Unified SecOps Platform version 6.4.20.
CVE-2024-7604 is an incorrect authorization vulnerability that enables local attackers to bypass authentication.
CVE-2024-7604 requires local access to the system to exploit, meaning it cannot be exploited remotely.