Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-42222
Modified
More InfoOfficial Page
Source-security@apache.org
View Known Exploited Vulnerability (KEV) details
Published At-07 Aug, 2024 | 08:16
Updated At-14 Mar, 2025 | 16:15

In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and data. Affected users are advised to upgrade to version 4.19.1.1 to address this issue. Users on older versions of CloudStack considering to upgrade, can skip 4.19.1.0 and upgrade directly to 4.19.1.1.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Secondary3.14.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Type: Primary
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CPE Matches

The Apache Software Foundation
apache
>>cloudstack>>4.19.1.0
cpe:2.3:a:apache:cloudstack:4.19.1.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Secondarysecurity@apache.org
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: CWE-200
Type: Secondary
Source: security@apache.org
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://cloudstack.apache.org/blog/security-release-advisory-4.19.1.1-4.18.2.3security@apache.org
Vendor Advisory
https://github.com/apache/cloudstack/issues/9456security@apache.org
Exploit
Issue Tracking
Third Party Advisory
https://lists.apache.org/thread/lxqtfd6407prbw3801hb4fz3ot3t8wljsecurity@apache.org
Mailing List
Vendor Advisory
https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-3-and-4-19-1-1/security@apache.org
Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/08/06/6af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: https://cloudstack.apache.org/blog/security-release-advisory-4.19.1.1-4.18.2.3
Source: security@apache.org
Resource:
Vendor Advisory
Hyperlink: https://github.com/apache/cloudstack/issues/9456
Source: security@apache.org
Resource:
Exploit
Issue Tracking
Third Party Advisory
Hyperlink: https://lists.apache.org/thread/lxqtfd6407prbw3801hb4fz3ot3t8wlj
Source: security@apache.org
Resource:
Mailing List
Vendor Advisory
Hyperlink: https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-3-and-4-19-1-1/
Source: security@apache.org
Resource:
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2024/08/06/6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Change History
0Changes found

Details not found