Use of Default Credentials vulnerability in Tananaev Solutions Traccar Server on Administrator Panel modules allows Authentication Abuse.This issue affects the privileged transactions implemented by the Traccar solution that should otherwise be protected by the authentication mechanism.
These transactions could have an impact on any sensitive aspect of the platform, including Confidentiality, Integrity and Availability.
References
Link | Resource |
---|---|
https://asrg.io/security-advisories/cve-2024-7746/ | Third Party Advisory |
Configurations
History
22 Aug 2024, 14:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://asrg.io/security-advisories/cve-2024-7746/ - Third Party Advisory | |
CPE | cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-287 | |
Summary |
|
|
First Time |
Traccar
Traccar traccar |
13 Aug 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-13 16:15
Updated : 2024-08-22 14:40
NVD link : CVE-2024-7746
Mitre link : CVE-2024-7746
CVE.ORG link : CVE-2024-7746
JSON object : View
Products Affected
traccar
- traccar