CVE-2024-6977

A vulnerability in Cato Networks SDP Client on Windows allows the insertion of sensitive information into the log file, which can lead to an account takeover. However, the attack requires bypassing protections on modifying the tunnel token on a the attacker's system.This issue affects SDP Client: before 5.10.34.
Configurations

Configuration 1 (hide)

cpe:2.3:a:catonetworks:cato_client:*:*:*:*:*:windows:*:*

History

27 Aug 2024, 15:41

Type Values Removed Values Added
CPE cpe:2.3:a:catonetworks:cato_client:*:*:*:*:*:windows:*:*
First Time Catonetworks
Catonetworks cato Client
References () https://support.catonetworks.com/hc/en-us/articles/19766795729437-CVE-2024-6977-Windows-SDP-Client-Sensitive-data-in-trace-logs-can-lead-to-account-takeover - () https://support.catonetworks.com/hc/en-us/articles/19766795729437-CVE-2024-6977-Windows-SDP-Client-Sensitive-data-in-trace-logs-can-lead-to-account-takeover - Exploit, Vendor Advisory

01 Aug 2024, 12:42

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad en Cato Networks SDP Client en Windows permite la inserción de información confidencial en el archivo de registro, lo que puede llevar a la apropiación de la cuenta. Sin embargo, el ataque requiere eludir las protecciones al modificar el token del túnel en el sistema del atacante. Este problema afecta a SDP Client: anterior a 5.10.34.

31 Jul 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-31 17:15

Updated : 2024-08-27 15:41


NVD link : CVE-2024-6977

Mitre link : CVE-2024-6977

CVE.ORG link : CVE-2024-6977


JSON object : View

Products Affected

catonetworks

  • cato_client
CWE
CWE-532

Insertion of Sensitive Information into Log File