Logsign Unified SecOps Platform Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the web service, which listens on TCP port 443 by default. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-25336.
References
Link | Resource |
---|---|
https://support.logsign.net/hc/en-us/articles/22076844908946-18-10-2024-Version-6-4-32-Release-Notes | Release Notes |
https://www.zerodayinitiative.com/advisories/ZDI-25-085/ | Third Party Advisory |
Configurations
History
18 Feb 2025, 21:34
Type | Values Removed | Values Added |
---|---|---|
First Time |
Logsign
Logsign unified Secops Platform |
|
CPE | cpe:2.3:a:logsign:unified_secops_platform:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo | |
Summary |
|
|
References | () https://support.logsign.net/hc/en-us/articles/22076844908946-18-10-2024-Version-6-4-32-Release-Notes - Release Notes | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-25-085/ - Third Party Advisory |
11 Feb 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-11 20:15
Updated : 2025-02-18 21:34
NVD link : CVE-2025-1044
Mitre link : CVE-2025-1044
CVE.ORG link : CVE-2025-1044
JSON object : View
Products Affected
logsign
- unified_secops_platform
CWE