CVE-2024-6890
Journyx Unauthenticated Password Reset Bruteforce
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.
Los tokens de restablecimiento de contraseña se generan utilizando una fuente aleatoria insegura. Los atacantes que conocen el nombre de usuario del usuario de instalación de Journyx pueden forzar el restablecimiento de contraseña y cambiar la contraseña de administrador.
Journyx version 11.5.4 suffers from an issue where password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-07-18 CVE Reserved
- 2024-08-07 CVE Published
- 2024-08-08 CVE Updated
- 2024-08-08 First Exploit
- 2024-08-13 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-321: Use of Hard-coded Cryptographic Key
- CWE-334: Small Space of Random Values
- CWE-799: Improper Control of Interaction Frequency
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://korelogic.com/Resources/Advisories/KL-001-2024-007.txt | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/180000 | 2024-08-08 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Journyx Search vendor "Journyx" | Journyx (jtime) Search vendor "Journyx" for product "Journyx (jtime)" | 11.5.4 Search vendor "Journyx" for product "Journyx (jtime)" and version "11.5.4" | en |
Affected
|