CVE-2024-42165

Insufficiently random values for generating activation token in FIWARE Keyrock <= 8.4 allow attackers to activate accounts of any user by predicting the token for the activation link.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:fiware:keyrock:*:*:*:*:*:*:*:*

History

29 Aug 2024, 15:21

Type Values Removed Values Added
References () https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories - () https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 6.3
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:fiware:keyrock:*:*:*:*:*:*:*:*
First Time Fiware
Fiware keyrock
Summary
  • (es) Los valores insuficientemente aleatorios para generar el token de activación en FIWARE Keyrock &lt;= 8.4 permiten a los atacantes activar cuentas de cualquier usuario prediciendo el token para el enlace de activación.

12 Aug 2024, 13:41

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-12 13:38

Updated : 2024-08-29 15:21


NVD link : CVE-2024-42165

Mitre link : CVE-2024-42165

CVE.ORG link : CVE-2024-42165


JSON object : View

Products Affected

fiware

  • keyrock
CWE
CWE-330

Use of Insufficiently Random Values