- Description
- In Teltonika Networks RUTOS devices, running on versions 7.0 to 7.8 (excluding) and TSWOS devices running on versions 1.0 to 1.3 (excluding), due to incorrect permission handling a vulnerability exists which allows a lower privileged user with default permissions to access critical device resources via the API.
- Source
- 001d69cf-3fc9-4203-93fb-9865b54e05b2
- NVD status
- Received
CVSS 4.0
- Type
- Secondary
- Base score
- 5.9
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- MEDIUM
- 001d69cf-3fc9-4203-93fb-9865b54e05b2
- CWE-732
- Hype score
- Not currently trending
CVE-2024-8256 In Teltonika Networks RUTOS devices, running on versions 7.0 to 7.8 (excluding) and TSWOS devices running on versions 1.0 to 1.3 (excluding), due to incorrect permissio… https://t.co/HZLB0YSALp
@CVEnew
10 Dec 2024
101 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-8256 Unauthorized Access to Critical Resources via API in Teltonika Devices Teltonika Networks RUTOS devices, using versions 7.0 to just before 7.8, and TSWOS devices, running versions 1.0 to just before... https://t.co/jcYJmgoChH
@VulmonFeeds
10 Dec 2024
39 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes