CVE-2024-1683 Vulnerability Details

  /     /     /  

CVE-2024-1683 Metadata Quick Info

CVE Published: 23/02/2024 | CVE Updated: 01/08/2024 | CVE Year: 2024
Source: tenable | Vendor: Tenable | Product: Tenable Identity Exposure Secure Relay
Status : PUBLISHED

CVE-2024-1683 Description

A DLL injection vulnerability exists where an authenticated, low-privileged local attacker could modify application files on the TIE Secure Relay host, which could allow for overriding of the configuration and running of new Secure Relay services.

Metrics

CVSS Version: 3.1 | Base Score: 7.3 HIGH
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L

l➤ Exploitability Metrics:
    Attack Vector (AV)* LOCAL
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* LOW
    User Interaction (UI)* NONE
    Scope (S)* CHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* NONE
    Integrity Impact (I)* HIGH
    Availability Impact (A)* LOW

Weakness Enumeration (CWE)

CWE-ID: CWE-78
CWE Name: CWE-78 Improper Neutralization of Special Elements used in an OS Command ( OS Command Injection )
Source: Tenable

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-641
CAPEC Description: CAPEC-641 DLL Side-Loading


Source: NVD (National Vulnerability Database).