Yealink Meeting Server before V26.0.0.67 allows attackers to obtain static key information from a front-end JS file and decrypt the plaintext passwords based on the obtained key information.
References
Link | Resource |
---|---|
https://www.yealink.com/en/trust-center/security-advisories/b1998ab629254ca3 | Vendor Advisory |
Configurations
History
07 Mar 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Nov 2024, 21:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:yealink:yealink_meeting_server:*:*:*:*:*:*:*:* | |
First Time |
Yealink
Yealink yealink Meeting Server |
|
References | () http://yealink.com - Product | |
References | () https://www.yealink.com/en/trust-center/security-advisories/b1998ab629254ca3 - Vendor Advisory |
05 Nov 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-922 |
01 Nov 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-01 18:15
Updated : 2025-03-07 21:15
NVD link : CVE-2024-48353
Mitre link : CVE-2024-48353
CVE.ORG link : CVE-2024-48353
JSON object : View
Products Affected
yealink
- yealink_meeting_server
CWE
CWE-922
Insecure Storage of Sensitive Information