In Cleo Harmony before 5.8.0.24, VLTrader before 5.8.0.24, and LexiCom before 5.8.0.24, an unauthenticated user can import and execute arbitrary Bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.
References
Link | Resource |
---|---|
https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Advisory-CVE-Pending | Vendor Advisory |
https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update | Vendor Advisory |
https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
05 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE |
20 Dec 2024, 15:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cleo:harmony:*:*:*:*:*:*:*:* cpe:2.3:a:cleo:vltrader:*:*:*:*:*:*:*:* cpe:2.3:a:cleo:lexicom:*:*:*:*:*:*:*:* |
|
References | () https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Advisory-CVE-Pending - Vendor Advisory | |
References | () https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update - Vendor Advisory | |
References | () https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild - Exploit, Third Party Advisory | |
CWE | CWE-77 | |
First Time |
Cleo
Cleo vltrader Cleo harmony Cleo lexicom |
16 Dec 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-276 | |
Summary |
|
13 Dec 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Dec 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-13 21:15
Updated : 2025-03-14 20:48
NVD link : CVE-2024-55956
Mitre link : CVE-2024-55956
CVE.ORG link : CVE-2024-55956
JSON object : View
Products Affected
cleo
- vltrader
- harmony
- lexicom
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')