6.5
CVE-2024-45651
- EPSS 0.04%
- Published 18.04.2025 11:04:55
- Last modified 18.07.2025 14:16:12
- Source psirt@us.ibm.com
- Teams watchlist Login
- Open Login
IBM Sterling Connect:Direct Web Services 6.1.0, 6.2.0, and 6.3.0 does not invalidate session after a browser closure which could allow an authenticated user to impersonate another user on the system.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Ibm ≫ Sterling Connect Direct Web Services Version >= 6.1.0 < 6.1.0.28
Ibm ≫ Sterling Connect Direct Web Services Version >= 6.2.0 < 6.2.0.27
Ibm ≫ Sterling Connect Direct Web Services Version >= 6.3.0 < 6.3.0.13
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.096 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
|
psirt@us.ibm.com | 6.3 | 2.8 | 3.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
CWE-613 Insufficient Session Expiration
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."