Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-12012 | First vendor Publication | 2025-02-13 |
Vendor | Cve | Last vendor Modification | 2025-02-13 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
A CWE-598 “Use of GET Request Method with Sensitive Query Strings†was discovered affecting the 130.8005 TCP/IP Gateway running firmware version 12h. Both the SHA-1 hash of the password as well as the session tokens are included as part of the URL and therefore exposed to information leakage scenarios. An attacker capable of accessing such values (e.g., victim browser, network traffic inspection) can exploit this vulnerability to leak both the password hash as well as session tokens and bypass the authentication mechanism using a pass-the-hash attack. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12012 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-598 | Information Leak Through Query Strings in GET Request |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2025-02-13 21:20:29 |
|