Server-Side Access Control Bypass vulnerability in WombatDialer before 25.02 could allow unauthorized users to potentially call certain services without the necessary access level. This issue is limited to services used by the client (not the general-use JSON services) and requires reverse engineering of the proprietary serialization protocol, making it difficult to exploit.
History

Wed, 19 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-306
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 18 Feb 2025 19:00:00 +0000

Type Values Removed Values Added
Description Server-Side Access Control Bypass vulnerability in WombatDialer before 25.02 could allow unauthorized users to potentially call certain services without the necessary access level. This issue is limited to services used by the client (not the general-use JSON services) and requires reverse engineering of the proprietary serialization protocol, making it difficult to exploit.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-02-18T00:00:00.000Z

Updated: 2025-02-19T20:14:19.607Z

Reserved: 2025-01-09T00:00:00.000Z

Link: CVE-2024-57055

cve-icon Vulnrichment

Updated: 2025-02-19T20:14:08.076Z

cve-icon NVD

Status : Received

Published: 2025-02-18T19:15:20.343

Modified: 2025-02-19T21:15:15.227

Link: CVE-2024-57055

cve-icon Redhat

No data.