fkie_cve-2024-25066
Vulnerability from fkie_nvd
Published
2025-02-17 21:15
Modified
2025-02-17 21:15
Summary
RSA Authentication Manager before 8.7 SP2 Patch 1 allows XML External Entity (XXE) attacks via a license file, resulting in attacker-controlled files being stored on the product's server. Data exfiltration cannot occur.
Impacted products
Vendor Product Version



{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "RSA Authentication Manager before 8.7 SP2 Patch 1 allows XML External Entity (XXE) attacks via a license file, resulting in attacker-controlled files being stored on the product\u0027s server. Data exfiltration cannot occur."
    },
    {
      "lang": "es",
      "value": "RSA Authentication Manager anterior a la versi\u00f3n 8.7 SP2 Patch 1 permite ataques de entidad externa XML (XXE) a trav\u00e9s de un archivo de licencia, lo que hace que los archivos controlados por el atacante se almacenen en el servidor del producto. No se puede producir la exfiltraci\u00f3n de datos."
    }
  ],
  "id": "CVE-2024-25066",
  "lastModified": "2025-02-17T21:15:10.993",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "cve@mitre.org",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-02-17T21:15:10.993",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://community.rsa.com/s/advisories"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://community.rsa.com/s/article/RSA-Authentication-Manager-8-7-SP2-Patch-1-Readme"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/KaiwenTM/CVE_POC/blob/main/CVE-2024-25066.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.rsa.com/en-us/company/vulnerability-response-policy"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Received",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-611"
        }
      ],
      "source": "cve@mitre.org",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.