CVSS 3.1 Score 7.3 of 10 (high)


Published Apr 13, 2024
Updated: Apr 15, 2024
CWE ID 295


A critical vulnerability (CVE-2024-3738) has been identified in cym1102 nginxWebUI up to version 3.9.9, affecting various products such as vZZiqs, vZZiqu, vZZiqr, vZa1dn, vZa1do, vZX0Ic, vZX0Id, vZa1dp, vZa1dq, and vZZiuR. The vulnerability lies in the handlePath function of the /adminPage/conf/saveCmd file and can be exploited remotely through the manipulation of the nginxPath argument. This leads to improper certificate validation. The exploit has been publicly disclosed and carries a risk score of 30. It is rated as high severity with a base score of 7.3 according to CVSS:3.1 standards. Although the impact on confidentiality and integrity is low, organizations should be aware of this vulnerability and take appropriate remediation measures to prevent potential attacks.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-3738 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options