CVE-2024-3738
CVSS 3.1 Score 7.3 of 10 (high)
Details
Summary
A critical vulnerability (CVE-2024-3738) has been identified in cym1102 nginxWebUI up to version 3.9.9, affecting various products such as vZZiqs, vZZiqu, vZZiqr, vZa1dn, vZa1do, vZX0Ic, vZX0Id, vZa1dp, vZa1dq, and vZZiuR. The vulnerability lies in the handlePath function of the /adminPage/conf/saveCmd file and can be exploited remotely through the manipulation of the nginxPath argument. This leads to improper certificate validation. The exploit has been publicly disclosed and carries a risk score of 30. It is rated as high severity with a base score of 7.3 according to CVSS:3.1 standards. Although the impact on confidentiality and integrity is low, organizations should be aware of this vulnerability and take appropriate remediation measures to prevent potential attacks.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions