Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log.
2N has released an updated version 2.46 of 2N OS, where this vulnerability is mitigated. It is recommended that all customers update their devices to the latest 2N OS.
References
Configurations
No configuration.
History
21 Feb 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log. 2N has released an updated version 2.46 of 2N OS, where this vulnerability is mitigated. It is recommended that all customers update their devices to the latest 2N OS. |
06 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-06 19:15
Updated : 2025-02-21 12:15
NVD link : CVE-2024-13416
Mitre link : CVE-2024-13416
CVE.ORG link : CVE-2024-13416
JSON object : View
Products Affected
No product.
CWE
CWE-532
Insertion of Sensitive Information into Log File