Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

soar

Source -

NVD

CNA CVEs -

0

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

5
Related CVEsRelated VendorsRelated AssignersReports
5Vulnerabilities found

CVE-2024-45670
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.06% / 19.60%
||
7 Day CHG~0.00%
Published-14 Nov, 2024 | 11:50
Updated-16 Nov, 2024 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Security SOAR weak password recovery mechanism

IBM Security SOAR 51.0.1.0 and earlier contains a mechanism for users to recover or change their passwords without knowing the original password, but the user account must be compromised prior to the weak recovery mechanism.

Action-Not Available
Vendor-IBM Corporation
Product-soarSecurity SOAR
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2024-48952
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 14.51%
||
7 Day CHG~0.00%
Published-07 Nov, 2024 | 00:00
Updated-30 Apr, 2025 | 16:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Logpoint before 7.5.0. SOAR uses a static JWT secret key to generate tokens that allow access to SOAR API endpoints without authentication. This static key vulnerability enables attackers to create custom JWT secret keys for unauthorized access to these endpoints.

Action-Not Available
Vendor-logpointn/a
Product-soarn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-3997
Assigner-Splunk Inc.
ShareView Details
Assigner-Splunk Inc.
CVSS Score-8.6||HIGH
EPSS-0.08% / 23.62%
||
7 Day CHG~0.00%
Published-31 Jul, 2023 | 16:16
Updated-28 Feb, 2025 | 11:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Log Injection In Splunk SOAR

Splunk SOAR versions lower than 6.1.0 are indirectly affected by a potential vulnerability accessed through the user’s terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal user’s action.

Action-Not Available
Vendor-Splunk LLC (Cisco Systems, Inc.)
Product-soarSplunk SOAR (On-premises)Splunk SOAR (Cloud)
CWE ID-CWE-117
Improper Output Neutralization for Logs
CWE ID-CWE-116
Improper Encoding or Escaping of Output
CVE-2021-29785
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.22% / 44.86%
||
7 Day CHG~0.00%
Published-20 Jan, 2022 | 19:40
Updated-17 Sep, 2024 | 04:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, Inc
Product-linux_kernelsoarSecurity SOAR
CVE-2020-4635
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-3.7||LOW
EPSS-0.16% / 37.74%
||
7 Day CHG~0.00%
Published-19 Mar, 2021 | 15:20
Updated-17 Sep, 2024 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Resilient SOAR 40 and earlier could disclose sensitive information by allowing a user to enumerate usernames.

Action-Not Available
Vendor-Red Hat, Inc.IBM Corporation
Product-enterprise_linuxsoarResilient