- Description
- Yealink Meeting Server before V26.0.0.67 allows attackers to obtain static key information from a front-end JS file and decrypt the plaintext passwords based on the obtained key information.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
- Hype score
- Not currently trending
CVE-2024-48353 Static Key Exposure Leads to Password Decryption in Yealink Meeting Serv... https://t.co/B23zgS6Ru1 Vulnerability Notification: https://t.co/xhLrNnfyrO
@VulmonFeeds
2 Nov 2024
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-48353 Yealink Meeting Server before V26.0.0.67 allows attackers to obtain static key information from a front-end JS file and decrypt the plaintext passwords based on the o… https://t.co/Y8Nkw3PEYA
@CVEnew
1 Nov 2024
504 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yealink:yealink_meeting_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "57867FD3-3012-4EA5-9BF8-DD78D92C04C2",
"versionEndExcluding": "26.0.0.67"
}
],
"operator": "OR"
}
]
}
]