CVE-2024-13416

Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log. 2N has released an updated version 2.46 of 2N OS, where this vulnerability is mitigated. It is recommended that all customers update their devices to the latest 2N OS.
Configurations

No configuration.

History

21 Feb 2025, 12:15

Type Values Removed Values Added
Summary
  • (es) Al utilizar la API en el dispositivo 2N OS, el usuario autorizado puede habilitar el registro, que revela tokens de autenticación válidos en el registro del sistema.
Summary (en) Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log. (en) Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log. 2N has released an updated version 2.46 of 2N OS, where this vulnerability is mitigated. It is recommended that all customers update their devices to the latest 2N OS.

06 Feb 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-06 19:15

Updated : 2025-02-21 12:15


NVD link : CVE-2024-13416

Mitre link : CVE-2024-13416

CVE.ORG link : CVE-2024-13416


JSON object : View

Products Affected

No product.

CWE
CWE-532

Insertion of Sensitive Information into Log File