CVE-2024-3738

CVSS 3.1 Score 7.3 of 10 (high)

Details

Published Apr 13, 2024
Updated: Apr 15, 2024
CWE ID 295

Summary

A critical vulnerability (CVE-2024-3738) has been identified in cym1102 nginxWebUI up to version 3.9.9, affecting various products such as vZZiqs, vZZiqu, vZZiqr, vZa1dn, vZa1do, vZX0Ic, vZX0Id, vZa1dp, vZa1dq, and vZZiuR. The vulnerability lies in the handlePath function of the /adminPage/conf/saveCmd file and can be exploited remotely through the manipulation of the nginxPath argument. This leads to improper certificate validation. The exploit has been publicly disclosed and carries a risk score of 30. It is rated as high severity with a base score of 7.3 according to CVSS:3.1 standards. Although the impact on confidentiality and integrity is low, organizations should be aware of this vulnerability and take appropriate remediation measures to prevent potential attacks.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-3738 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions