diff --git a/cves/2024/12xxx/CVE-2024-12297.json b/cves/2024/12xxx/CVE-2024-12297.json index 67bdae9a268..eb5b121ee46 100644 --- a/cves/2024/12xxx/CVE-2024-12297.json +++ b/cves/2024/12xxx/CVE-2024-12297.json @@ -8,7 +8,7 @@ "assignerShortName": "Moxa", "dateReserved": "2024-12-06T04:02:40.742Z", "datePublished": "2025-01-15T10:00:46.524Z", - "dateUpdated": "2025-01-15T14:49:22.117Z" + "dateUpdated": "2025-03-06T08:27:52.297Z" }, "containers": { "cna": { @@ -25,6 +25,123 @@ "versionType": "custom" } ] + }, + { + "defaultStatus": "unaffected", + "product": "PT-508 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "3.8", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "PT-510 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "3.8", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "PT-7528 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "5.0", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "PT-7728 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "3.9", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "PT-7828 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "4.0", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "PT-G503 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "5.3", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "PT-G510 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "6.5", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "PT-G7728 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "6.5", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] + }, + { + "defaultStatus": "unaffected", + "product": "PT-G7828 Series", + "vendor": "Moxa", + "versions": [ + { + "lessThanOrEqual": "6.5", + "status": "affected", + "version": "1.0", + "versionType": "custom" + } + ] } ], "credits": [ @@ -41,10 +158,10 @@ { "base64": false, "type": "text/html", - "value": "Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.
" + "value": "Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.
" } ], - "value": "Moxa’s Ethernet switch EDS-508A Series, running firmware version 3.11 and earlier, is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device." + "value": "Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device." } ], "impacts": [ @@ -107,7 +224,7 @@ "providerMetadata": { "orgId": "2e0a0ee2-d866-482a-9f5e-ac03d156dbaa", "shortName": "Moxa", - "dateUpdated": "2025-01-15T10:00:46.524Z" + "dateUpdated": "2025-03-06T08:27:52.297Z" }, "references": [ { @@ -115,6 +232,12 @@ "vendor-advisory" ], "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241407-cve-2024-12297-frontend-authorization-logic-disclosure-vulnerability-in-eds-508a-series" + }, + { + "tags": [ + "vendor-advisory" + ], + "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241408-cve-2024-12297-frontend-authorization-logic-disclosure-vulnerability-identified-in-pt-switches" } ], "solutions": [ @@ -124,14 +247,14 @@ { "base64": false, "type": "text/html", - "value": "

Moxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below.

" + "value": "

Moxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below.

" } ], - "value": "Moxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below.\n\n * EDS-508A Series: Please contact Moxa Technical Support for the security patch" + "value": "Moxa has released appropriate solutions to address vulnerability. The solutions for the affected products are listed below.\n\n * EDS-508A Series: Please contact Moxa Technical Support for the security patch\n\n\n * PT Series: Please contact Moxa Technical Support for the security patch" } ], "source": { - "discovery": "UNKNOWN" + "discovery": "EXTERNAL" }, "title": "Frontend Authorization Logic Disclosure Vulnerability", "workarounds": [ diff --git a/cves/2025/1xxx/CVE-2025-1540.json b/cves/2025/1xxx/CVE-2025-1540.json new file mode 100644 index 00000000000..8bd356be4fb --- /dev/null +++ b/cves/2025/1xxx/CVE-2025-1540.json @@ -0,0 +1,123 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2025-1540", + "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", + "state": "PUBLISHED", + "assignerShortName": "GitLab", + "dateReserved": "2025-02-21T09:02:14.816Z", + "datePublished": "2025-03-06T08:31:07.791Z", + "dateUpdated": "2025-03-06T08:31:07.791Z" + }, + "containers": { + "cna": { + "title": "Incorrect Authorization in GitLab", + "descriptions": [ + { + "lang": "en", + "value": "An issue has been discovered in GitLab CE/EE for Self-Managed and Dedicated instances affecting all versions from 17.5 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2. It was possible for a user added as an External to read and clone internal projects under certain circumstances.\"" + } + ], + "affected": [ + { + "vendor": "GitLab", + "product": "GitLab", + "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", + "cpes": [ + "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" + ], + "versions": [ + { + "version": "17.5", + "status": "affected", + "lessThan": "17.6.5", + "versionType": "semver" + }, + { + "version": "17.7", + "status": "affected", + "lessThan": "17.7.4", + "versionType": "semver" + }, + { + "version": "17.8", + "status": "affected", + "lessThan": "17.8.2", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "lang": "en", + "description": "CWE-863: Incorrect Authorization", + "cweId": "CWE-863", + "type": "CWE" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/512765", + "name": "GitLab Issue #512765", + "tags": [ + "issue-tracking", + "permissions-required" + ] + }, + { + "url": "https://about.gitlab.com/releases/2025/02/12/patch-release-gitlab-17-8-2-released/#saml-authentication-misconfigures-external-user-attribute" + } + ], + "metrics": [ + { + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ], + "cvssV3_1": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + } + } + ], + "solutions": [ + { + "lang": "en", + "value": "Upgrade to version 17.8.2, 17.7.4 or 17.6.5." + } + ], + "credits": [ + { + "lang": "en", + "value": "Thanks [Renato Alves](https://gitlab.com/unode) for reporting this vulnerability.", + "type": "finder" + } + ], + "providerMetadata": { + "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", + "shortName": "GitLab", + "dateUpdated": "2025-03-06T08:31:07.791Z" + } + } + } +} \ No newline at end of file