Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log. 2N has released an updated version 2.46 of 2N OS, where this vulnerability is mitigated. It is recommended that all customers update their devices to the latest 2N OS.
History

Fri, 21 Feb 2025 12:15:00 +0000

Type Values Removed Values Added
Description Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log. Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log. 2N has released an updated version 2.46 of 2N OS, where this vulnerability is mitigated. It is recommended that all customers update their devices to the latest 2N OS.

Wed, 12 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Feb 2025 19:15:00 +0000

Type Values Removed Values Added
Description Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log.
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Axis

Published: 2025-02-06T19:09:06.798Z

Updated: 2025-02-21T12:12:46.226Z

Reserved: 2025-01-15T18:22:25.502Z

Link: CVE-2024-13416

cve-icon Vulnrichment

Updated: 2025-02-12T19:41:05.284Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-02-06T19:15:19.220

Modified: 2025-02-21T12:15:29.193

Link: CVE-2024-13416

cve-icon Redhat

No data.