SB2024082607 - Multiple vulnerabilities in upKeeper Manager



SB2024082607 - Multiple vulnerabilities in upKeeper Manager

Published: August 26, 2024 Updated: August 26, 2024

Security Bulletin ID SB2024082607
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 60% Medium 40%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Authorization bypass through user-controlled key (CVE-ID: CVE-2024-42464)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to authorization bypass through user-controlled key. A remote user can send a specially crafted request and gain access to sensitive information on the system.


2) Improper Restriction of Excessive Authentication Attempts (CVE-ID: CVE-2024-42466)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to improper restriction of excessive authentication attempts. A remote attacker can conduct brute force attacks and bypass authentication.


3) Authorization bypass through user-controlled key (CVE-ID: CVE-2024-42463)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to authorization bypass through user-controlled key. A remote user can send a specially crafted request and gain access to sensitive information on the system.


4) Improper Authentication (CVE-ID: CVE-2024-42462)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error when processing authentication requests in the administration login process. A remote attacker can bypass authentication process and gain unauthorized access to the application.


5) Improper Restriction of Excessive Authentication Attempts (CVE-ID: CVE-2024-42465)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to improper restriction of excessive authentication attempts. A remote attacker can conduct brute force attacks and bypass authentication.


Remediation

Install update from vendor's website.