// For flags

CVE-2024-29231

 

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Improper validation of array index vulnerability in UserPrivilege.Enum webapi component in Synology Surveillance Station before 9.2.0-9289 and 9.2.0-11289 allows remote authenticated users to bypass security constraints via unspecified vectors.

La validación incorrecta de la vulnerabilidad del índice de matriz en el componente webapi UserPrivilege.Enum en Synology Surveillance Station anterior a 9.2.0-9289 y 9.2.0-11289 permite a los usuarios autenticados remotamente eludir las restricciones de seguridad a través de vectores no especificados.

*Credits: TEAM.ENVY (https://team-envy.gitbook.io/team.envy/about-us)
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-03-19 CVE Reserved
  • 2024-03-28 CVE Published
  • 2024-03-28 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-129: Improper Validation of Array Index
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Synology
Search vendor "Synology"
Surveillance Station
Search vendor "Synology" for product "Surveillance Station"
< 9.2.0-9289
Search vendor "Synology" for product "Surveillance Station" and version " < 9.2.0-9289"
en
Affected
Synology
Search vendor "Synology"
Surveillance Station
Search vendor "Synology" for product "Surveillance Station"
< 9.2.0-11289
Search vendor "Synology" for product "Surveillance Station" and version " < 9.2.0-11289"
en
Affected