The sessions are stored in clear-text logs. An attacker can retrieve authentication sessions. A remote attacker can retrieve the credentials and bypass the authentication mechanism. As for the affected products/models/versions, see the reference URL.
History

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Toshiba

Published: 2024-06-14T03:22:31.415Z

Updated: 2025-02-13T17:46:03.782Z

Reserved: 2024-02-21T02:11:56.735Z

Link: CVE-2024-27157

cve-icon Vulnrichment

Updated: 2024-08-02T00:27:59.245Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-14T04:15:26.607

Modified: 2024-11-21T09:03:58.720

Link: CVE-2024-27157

cve-icon Redhat

No data.