CVE-2024-3013
moderate-risk
Published 2024-03-28
A flaw has been found in Teledyne FLIR AX8 up to 1.46.16. The impacted element is an unknown function of the file /tools/test_login.php?action=register of the component User Registration. Executing manipulation can lead to improper authorization. The attack may be performed from remote. The exploit has been published and may be used. Upgrading to version 1.49.16 is sufficient to resolve this issue. Upgrading the affected component is recommended. The vendor points out: "FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities."
Do I need to act?
~
2.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (8)
Permissions Required
https://vuldb.com/?ctiid.258299
Third Party Advisory
https://vuldb.com/?id.258299
Third Party Advisory
https://vuldb.com/?submit.301588
Permissions Required
https://vuldb.com/?ctiid.258299
Third Party Advisory
https://vuldb.com/?id.258299
Third Party Advisory
https://vuldb.com/?submit.301588
34
/ 100
moderate-risk
Severity
23/34 · High
Exploitability
6/34 · Minimal
Exposure
5/34 · Minimal