6.5
CVE-2024-45589
- EPSS 7.78%
- Veröffentlicht 05.09.2024 16:15:08
- Zuletzt bearbeitet 12.09.2024 16:54:09
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
RapidIdentity LTS through 2023.0.2 and Cloud through 2024.08.0 improperly restricts excessive authentication attempts and allows a remote attacker to cause a denial of service via the username parameters.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Identityautomation ≫ Rapididentity SwEditionlts Version <= 2023.0.2
Identityautomation ≫ Rapididentity SwEditioncloud Version <= 2024.08.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 7.78% | 0.916 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.9 | 2.2 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-307 Improper Restriction of Excessive Authentication Attempts
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.