Overview
- Description
- Yealink Meeting Server before V26.0.0.67 allows attackers to obtain static key information from a front-end JS file and decrypt the plaintext passwords based on the obtained key information.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
CVE-2024-48353 Static Key Exposure Leads to Password Decryption in Yealink Meeting Serv... https://t.co/B23zgS6Ru1 Vulnerability Notification: https://t.co/xhLrNnfyrO
@VulmonFeeds
2 Nov 2024
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-48353 Yealink Meeting Server before V26.0.0.67 allows attackers to obtain static key information from a front-end JS file and decrypt the plaintext passwords based on the o… https://t.co/Y8Nkw3PEYA
@CVEnew
1 Nov 2024
504 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:yealink:yealink_meeting_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57867FD3-3012-4EA5-9BF8-DD78D92C04C2", "versionEndExcluding": "26.0.0.67" } ], "operator": "OR" } ] } ]