CVE-2024-31410
CyberPower PowerPanel business Use of Hard-coded Cryptographic Key
Severity Score
7.7
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
The devices which CyberPower PowerPanel manages use identical certificates based on a
hard-coded cryptographic key. This can allow an attacker to impersonate
any client in the system and send malicious data.
Los dispositivos que gestiona CyberPower PowerPanel utilizan certificados idénticos basados en una clave criptográfica codificada. Esto puede permitir que un atacante se haga pasar por cualquier cliente del sistema y envíe datos maliciosos.
*Credits:
Amir Preminger and Noam Moshe of Claroty Team82 Research reported these vulnerabilities to CISA.
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-04-29 CVE Reserved
- 2024-05-15 CVE Published
- 2024-05-16 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-321: Use of Hard-coded Cryptographic Key
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | ||
https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
CyberPower Search vendor "CyberPower" | PowerPanel Business Search vendor "CyberPower" for product "PowerPanel Business" | < 4.9.0 Search vendor "CyberPower" for product "PowerPanel Business" and version " < 4.9.0" | en |
Affected
|