diff --git a/http/cves/2024/CVE-2024-0799.yaml b/http/cves/2024/CVE-2024-0799.yaml index 03bbce83ca6..2009e683824 100644 --- a/http/cves/2024/CVE-2024-0799.yaml +++ b/http/cves/2024/CVE-2024-0799.yaml @@ -1,12 +1,12 @@ id: CVE-2024-0799 info: - name: Arcserve Unified Data Protection - wizardLogin Authentication Bypass + name: Arcserve Unified Data Protection - Authentication Bypass author: daffainfo severity: critical description: | An authentication bypass vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in the edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.EdgeLoginServiceImpl.doLogin() function within wizardLogin. - imapct: | + impact: | Attackers can bypass authentication, gaining unauthorized access to the system. remediation: | Update to the latest version of Arcserve Unified Data Protection or apply security patches provided by the vendor. @@ -23,7 +23,7 @@ info: cpe: cpe:2.3:a:arcserve:udp:*:*:*:*:*:*:*:* metadata: verified: true - max-request: 1 + max-request: 2 vendor: arcserve product: udp shodan-query: http.favicon.hash:1015186617