OMFLOW from The SYSCOM Group does not properly restrict access to the system settings modification functionality, allowing remote attackers with regular privileges to update system settings or create accounts with administrator privileges, thereby gaining control of the server.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/en/cp-139-8076-6ade0-2.html | Third Party Advisory |
https://www.twcert.org.tw/tw/cp-132-8075-a0d06-1.html | Third Party Advisory |
Configurations
History
17 Sep 2024, 11:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.twcert.org.tw/en/cp-139-8076-6ade0-2.html - Third Party Advisory | |
References | () https://www.twcert.org.tw/tw/cp-132-8075-a0d06-1.html - Third Party Advisory | |
CWE | NVD-CWE-Other | |
First Time |
Syscomgo omflow
Syscomgo |
|
CPE | cpe:2.3:a:syscomgo:omflow:*:*:*:*:*:*:*:* |
16 Sep 2024, 15:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
16 Sep 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-16 06:15
Updated : 2024-09-17 11:27
NVD link : CVE-2024-8779
Mitre link : CVE-2024-8779
CVE.ORG link : CVE-2024-8779
JSON object : View
Products Affected
syscomgo
- omflow
CWE