// For flags

CVE-2024-5264

Network Key Transfer with AES KHT vulnerability in Luna EFT

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Network Transfer with AES KHT in Thales Luna EFT 2.1 and above allows a user with administrative console access to access backups taken via offline analysis

La transferencia de red con AES KHT en Thales Luna EFT 2.1 y superior permite a un usuario con acceso a la consola administrativa acceder a las copias de seguridad realizadas mediante análisis fuera de línea.

*Credits: Cory Whitesell, Sr. Security Engineer, Transaction Network Services
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-05-23 CVE Reserved
  • 2024-05-23 CVE Published
  • 2024-06-22 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CAPEC
  • CAPEC-20: Encryption Brute Forcing
References (0)
URL Tag Source
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Thalesgroup
Search vendor "Thalesgroup"
Luna Eft
Search vendor "Thalesgroup" for product "Luna Eft"
2.1
Search vendor "Thalesgroup" for product "Luna Eft" and version "2.1"
-
Affected