Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-1621
Analyzed
More InfoOfficial Page
Source-4586e0a2-224d-4f8a-9cb4-8882b208c0b3
View Known Exploited Vulnerability (KEV) details
Published At-02 Sep, 2024 | 20:15
Updated At-17 Sep, 2024 | 14:12

The registration process of uniFLOW Online (NT-ware product) apps, prior to and including version 2024.1.0, can be compromised when email login is enabled on the tenant. Those tenants utilising email login in combination with Microsoft Safe Links or similar are impacted. This vulnerability may allow the attacker to register themselves against a genuine user in the system and allow malicious users with similar access and capabilities via the app to the existing genuine user.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.3HIGH
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 4.0
Base score: 8.3
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CPE Matches

nt-ware
nt-ware
>>uniflow_online>>Versions up to 2024.1.0(inclusive)
cpe:2.3:a:nt-ware:uniflow_online:*:*:*:*:*:-:*:*
nt-ware
nt-ware
>>uniflow_online>>-
cpe:2.3:a:nt-ware:uniflow_online:-:*:*:*:*:chrome:*:*
nt-ware
nt-ware
>>uniflow_online_print_\&_scan>>-
cpe:2.3:a:nt-ware:uniflow_online_print_\&_scan:-:*:*:*:*:andriod:*:*
nt-ware
nt-ware
>>uniflow_online_print_\&_scan>>-
cpe:2.3:a:nt-ware:uniflow_online_print_\&_scan:-:*:*:*:*:iphone_os:*:*
nt-ware
nt-ware
>>uniflow_smartclient>>-
cpe:2.3:a:nt-ware:uniflow_smartclient:-:*:*:*:*:macos:*:*
nt-ware
nt-ware
>>uniflow_smartclient>>-
cpe:2.3:a:nt-ware:uniflow_smartclient:-:*:*:*:*:windows:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE-940Secondary4586e0a2-224d-4f8a-9cb4-8882b208c0b3
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-940
Type: Secondary
Source: 4586e0a2-224d-4f8a-9cb4-8882b208c0b3
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://ntware.atlassian.net/wiki/spaces/SA/pages/12113215492/2024+Security+Advisory+Device+registration+susceptible+to+compromise4586e0a2-224d-4f8a-9cb4-8882b208c0b3
Vendor Advisory
https://www.canon-europe.com/psirt/advisory-information/4586e0a2-224d-4f8a-9cb4-8882b208c0b3
Vendor Advisory
Hyperlink: https://ntware.atlassian.net/wiki/spaces/SA/pages/12113215492/2024+Security+Advisory+Device+registration+susceptible+to+compromise
Source: 4586e0a2-224d-4f8a-9cb4-8882b208c0b3
Resource:
Vendor Advisory
Hyperlink: https://www.canon-europe.com/psirt/advisory-information/
Source: 4586e0a2-224d-4f8a-9cb4-8882b208c0b3
Resource:
Vendor Advisory
Change History
0Changes found

Details not found