This vulnerability exists in Reedos aiM-Star version 2.0.1 due to missing rate limiting on OTP requests in certain API endpoints. An authenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoints which could lead to the OTP bombing/flooding on the targeted system.
References
Link | Resource |
---|---|
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0291 | Third Party Advisory |
Configurations
History
18 Sep 2024, 19:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:reedos:aim-star:2.0.1:*:*:*:*:*:*:* | |
References | () https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0291 - Third Party Advisory | |
First Time |
Reedos aim-star
Reedos |
|
CWE | NVD-CWE-Other | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
11 Sep 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-11 12:15
Updated : 2024-09-18 19:57
NVD link : CVE-2024-45788
Mitre link : CVE-2024-45788
CVE.ORG link : CVE-2024-45788
JSON object : View
Products Affected
reedos
- aim-star
CWE