CVE Vulnerabilities

CVE-2024-10772

Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking

Published: Dec 06, 2024 | Modified: Dec 06, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Since the firmware update is not validated, an attacker can install modified firmware on the device. This has a high impact on the availabilty, integrity and confidentiality up to the complete compromise of the device.

Weakness

The product uses obfuscation or encryption of inputs that should not be mutable by an external actor, but the product does not use integrity checks to detect if those inputs have been modified.

Potential Mitigations

References