Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-55198

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-13 Mar, 2025 | 00:00
Updated At-19 Mar, 2025 | 18:38
Rejected At-
Credits

User Enumeration via Discrepancies in Error Messages in the Celk Sistemas Celk Saude v.3.1.252.1 password recovery functionality which allows a remote attacker to enumerate users through discrepancies in the responses.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:13 Mar, 2025 | 00:00
Updated At:19 Mar, 2025 | 18:38
Rejected At:
▼CVE Numbering Authority (CNA)

User Enumeration via Discrepancies in Error Messages in the Celk Sistemas Celk Saude v.3.1.252.1 password recovery functionality which allows a remote attacker to enumerate users through discrepancies in the responses.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html
N/A
https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55198
N/A
Hyperlink: https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html
Resource: N/A
Hyperlink: https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55198
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-204CWE-204 Observable Response Discrepancy
Type: CWE
CWE ID: CWE-204
Description: CWE-204 Observable Response Discrepancy
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55198
exploit
Hyperlink: https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55198
Resource:
exploit
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:13 Mar, 2025 | 15:15
Updated At:03 Apr, 2025 | 18:31

User Enumeration via Discrepancies in Error Messages in the Celk Sistemas Celk Saude v.3.1.252.1 password recovery functionality which allows a remote attacker to enumerate users through discrepancies in the responses.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CPE Matches

celk
celk
>>celk_saude>>3.1.252.1
cpe:2.3:a:celk:celk_saude:3.1.252.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-204Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-204
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.htmlcve@mitre.org
Technical Description
https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55198cve@mitre.org
Exploit
Third Party Advisory
https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55198134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit
Third Party Advisory
Hyperlink: https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html
Source: cve@mitre.org
Resource:
Technical Description
Hyperlink: https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55198
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory
Hyperlink: https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55198
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

101Records found

CVE-2022-22520
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-5.3||MEDIUM
EPSS-0.30% / 53.34%
||
7 Day CHG~0.00%
Published-14 Sep, 2022 | 14:05
Updated-17 Sep, 2024 | 04:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
User enumeration vulnerability in MB connect line and Helmholz products

A remote, unauthenticated attacker can enumerate valid users by sending specific requests to the webservice of MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2.

Action-Not Available
Vendor-helmholzmbconnectlineHelmholzMB connect line
Product-myrex24.virtualmymbconnect24myrex24mbconnect24mymbCONNECT24mbCONNECT24myREX24myREX24.virtual
CWE ID-CWE-204
Observable Response Discrepancy
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found