CVE-2024-42163

Insufficiently random values for generating password reset token in FIWARE Keyrock <= 8.4 allow attackers to take over the account of any user by predicting the token for the password reset link.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:fiware:keyrock:*:*:*:*:*:*:*:*

History

29 Aug 2024, 15:17

Type Values Removed Values Added
Summary
  • (es) Los valores insuficientemente aleatorios para generar el token de restablecimiento de contraseña en FIWARE Keyrock &lt;= 8.4 permiten a los atacantes hacerse cargo de la cuenta de cualquier usuario al predecir el token para el enlace de restablecimiento de contraseña.
CPE cpe:2.3:a:fiware:keyrock:*:*:*:*:*:*:*:*
References () https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories - () https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories - Exploit, Third Party Advisory
First Time Fiware
Fiware keyrock
CVSS v2 : unknown
v3 : 8.3
v2 : unknown
v3 : 8.1

12 Aug 2024, 13:41

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-12 13:38

Updated : 2024-08-29 15:17


NVD link : CVE-2024-42163

Mitre link : CVE-2024-42163

CVE.ORG link : CVE-2024-42163


JSON object : View

Products Affected

fiware

  • keyrock
CWE
CWE-326

Inadequate Encryption Strength