An attacker with access to the network where CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could steal the tokens used on the web, since these have no expiration date to access the web application without restrictions. Token theft can originate from different methods such as network captures, locally stored web information, etc.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
01 Oct 2024, 19:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
Circutor q-smt
Circutor Circutor q-smt Firmware |
|
CPE | cpe:2.3:h:circutor:q-smt:-:*:*:*:*:*:*:* cpe:2.3:o:circutor:q-smt_firmware:1.0.4:*:*:*:*:*:*:* |
20 Sep 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Sep 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-18 12:15
Updated : 2024-10-01 19:30
NVD link : CVE-2024-8888
Mitre link : CVE-2024-8888
CVE.ORG link : CVE-2024-8888
JSON object : View
Products Affected
circutor
- q-smt_firmware
- q-smt
CWE
CWE-613
Insufficient Session Expiration