An attacker with access to the network where CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could steal the tokens used on the web, since these have no expiration date to access the web application without restrictions. Token theft can originate from different methods such as network captures, locally stored web information, etc.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
01 Oct 2024, 19:30
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:o:circutor:q-smt_firmware:1.0.4:*:*:*:*:*:*:* cpe:2.3:h:circutor:q-smt:-:*:*:*:*:*:*:* |
|
References | () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products - Third Party Advisory | |
First Time |
Circutor
Circutor q-smt Circutor q-smt Firmware |
20 Sep 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Sep 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-18 12:15
Updated : 2024-10-01 19:30
NVD link : CVE-2024-8888
Mitre link : CVE-2024-8888
CVE.ORG link : CVE-2024-8888
JSON object : View
Products Affected
circutor
- q-smt
- q-smt_firmware
CWE
CWE-613
Insufficient Session Expiration