First published: Wed Jun 12 2024(Updated: )
This vulnerability allows remote attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability. The specific flaw exists within the password reset mechanism. The issue results from the lack of restriction of excessive authentication attempts. An attacker can leverage this vulnerability to reset a user's password and bypass authentication on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
Logsign Unified SecOps Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-24-616 has been classified as a critical vulnerability due to its potential for remote exploitation without authentication.
To mitigate ZDI-24-616, implement the latest security updates provided by Logsign for the Unified SecOps Platform.
The ZDI-24-616 vulnerability impacts installations of Logsign Unified SecOps Platform.
Yes, ZDI-24-616 can be exploited remotely as it allows bypassing authentication on affected systems.
The vulnerability in ZDI-24-616 specifically affects the password reset mechanism of the Logsign Unified SecOps Platform.