The session cookies, used for authentication, are stored in clear-text logs. An attacker can retrieve authentication sessions. A remote attacker can retrieve the credentials and bypass the authentication mechanism. As for the affected productsmodelsversions, see the reference URL.


Assigner: ecc0f906-8666-484c-bcf8-c3b7520a72f0

CWE: CWE-532

  • toshibatec product version


CVSS version: 3.1 Base score: 6.8
Base severity: MEDIUM Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Exploitability score: 2.5 Impact score: 4.2

Can you explain the CVE description?

This CVE description is for a vulnerability with the identifier CVE-2024-27156. The vulnerability is related to the storage of session cookies used for authentication in clear-text logs. This allows a remote attacker to retrieve authentication sessions, potentially gaining access to credentials and bypassing the authentication mechanism. The CVSS score for this vulnerability is 6.8, indicating a medium severity level. The affected products, models, and versions are not specified in the description but can be found in the reference URLs provided. The vulnerability was published on June 14, 2024, and the last modified date was also on the same day. The CWE associated with this vulnerability is CWE-532. There are several URLs provided for further information and resources related to this vulnerability. The exploitability score is 2.5 and the impact score is 4.2. The vector CVSS shows that the vulnerability has a base severity of MEDIUM, with specific details on the attack vector, complexity, privileges required, user interaction, scope, confidentiality impact, integrity impact, and availability impact. The assigner of this CVE is identified by the UUID ecc0f906-8666-484c-bcf8-c3b7520a72f0.

How can this vulnerability be part of an attack tree?

This vulnerability can be part of an attack tree by being used as a stepping stone for further attacks. For example, an attacker could exploit this vulnerability to retrieve authentication sessions and credentials, allowing them to bypass the authentication mechanism and gain unauthorized access to the system. Once inside, the attacker could then launch additional attacks such as data theft, privilege escalation, or further compromise of the system. This vulnerability could serve as an entry point in a larger attack chain, leading to more severe consequences for the affected system.

Generated on: 2024-07-05