CVE-2024-2056 Vulnerability Details

  /     /     /  

CVE-2024-2056 Metadata Quick Info

CVE Published: 05/03/2024 | CVE Updated: 23/08/2024 | CVE Year: 2024
Source: AHA | Vendor: Artica Tech | Product: Artica Proxy
Status : PUBLISHED

CVE-2024-2056 Description

Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov\'s \'tailon\' GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-288
CWE Name: CWE-288 Authentication Bypass Using an Alternate Path or Channel
Source: Artica Tech

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).