{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-8692","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-09-11T11:34:02.349Z","datePublished":"2024-09-11T18:31:08.638Z","dateUpdated":"2024-09-11T19:38:50.902Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-09-11T18:31:08.638Z"},"title":"TDuckCloud TDuckPro password recovery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-640","lang":"en","description":"CWE-640 Weak Password Recovery"}]}],"affected":[{"vendor":"TDuckCloud","product":"TDuckPro","versions":[{"version":"6.0","status":"affected"},{"version":"6.1","status":"affected"},{"version":"6.2","status":"affected"},{"version":"6.3","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical was found in TDuckCloud TDuckPro up to 6.3. Affected by this vulnerability is an unknown functionality. The manipulation leads to weak password recovery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In TDuckCloud TDuckPro bis 6.3 wurde eine kritische Schwachstelle entdeckt. Es geht um eine nicht näher bekannte Funktion. Durch das Beeinflussen mit unbekannten Daten kann eine weak password recovery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}}],"timeline":[{"time":"2024-09-11T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-09-11T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-09-11T13:39:34.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ShawRoot (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.277165","name":"VDB-277165 | TDuckCloud TDuckPro password recovery","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.277165","name":"VDB-277165 | CTI Indicators (IOB, IOC, TTP)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.401715","name":"Submit #401715 | TDuckCloud TDuckPro 2.0-6.3 Password Reset Disclosure","tags":["third-party-advisory"]},{"url":"https://www.shawroot.cc/2794.html","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"tduckcloud","product":"tduckpro","cpes":["cpe:2.3:a:tduckcloud:tduckpro:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.0","status":"affected"},{"version":"6.1","status":"affected"},{"version":"6.2","status":"affected"},{"version":"6.3","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-11T19:35:42.349417Z","id":"CVE-2024-8692","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T19:38:50.902Z"}}]}}