{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-45372","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","state":"PUBLISHED","assignerShortName":"jpcert","dateReserved":"2024-09-10T06:57:25.565Z","datePublished":"2024-09-26T04:06:47.174Z","dateUpdated":"2025-03-25T15:58:46.344Z"},"containers":{"cna":{"affected":[{"vendor":"PLANEX COMMUNICATIONS INC.","product":"MZK-DP300N","versions":[{"version":"firmware versions 1.04 and earlier","status":"affected"}]}],"descriptions":[{"lang":"en","value":"MZK-DP300N firmware versions 1.04 and earlier contains a cross-site request forger vulnerability. Viewing a malicious page while logging in to the web management page of the affected product may lead the user to perform unintended operations such as changing the login password, etc."}],"problemTypes":[{"descriptions":[{"description":"Cross-site request forgery (CSRF)","lang":"en-US","cweId":"CWE-352","type":"CWE"}]}],"references":[{"url":"https://www.planex.co.jp/support/download/mzk-dp300n/"},{"url":"https://jvn.jp/en/jp/JVN81966868/"}],"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2024-09-26T04:06:47.174Z"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.5,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-09-26T13:37:59.352659Z","id":"CVE-2024-45372","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-25T15:58:46.344Z"}}]}}