CVE-2024-3019

CVSS 3.1 Score 8.8 of 10 (high)

Details

Published Mar 28, 2024
CWE ID 668

Summary

CVE-2024-3019 is a vulnerability in PCP (Performance Co-Pilot) versions 4.3.4 and newer. The flaw is related to the default configuration of the pmproxy service, which exposes the Redis server backend to the local network. This allows remote attackers to execute commands with the privileges of the Redis user. It is important to note that this vulnerability can only be exploited when pmproxy is running, and it is not running by default, requiring manual activation. The potential danger of this vulnerability lies in the ability for an attacker to gain unauthorized access and perform malicious actions on affected systems. The severity rating for this vulnerability is high, with a base score of 8.8 according to CVSS version 3.1. Sources: - CVE Details: https://www.cvedetails.com/cve/CVE-2024-3019/ - Red Hat Security Advisory: https://access.redhat.com/security/cve/CVE-2024-3019

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-3019 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions