Metrics
Affected Vendors & Products
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-847/ |
![]() ![]() |
Wed, 19 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-200 | |
Metrics |
cvssV3_1
|
Tue, 18 Feb 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-862 | |
Metrics |
cvssV3_1
|
Fri, 31 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-862 | |
Metrics |
cvssV3_1
|
Fri, 31 Jan 2025 00:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DLT interface, which listens on TCP port 3490 by default. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device. | |
Title | Alpine Halo9 Missing Authentication | |
References |
|

Status: PUBLISHED
Assigner: icscert
Published: 2025-01-30T23:53:33.224Z
Updated: 2025-03-19T18:19:26.341Z
Reserved: 2024-01-25T00:14:40.299Z
Link: CVE-2024-23962

Updated: 2025-01-31T17:00:28.888Z

Status : Awaiting Analysis
Published: 2025-01-31T00:15:09.367
Modified: 2025-03-19T19:15:40.467
Link: CVE-2024-23962

No data.