Logsign Unified SecOps Platform Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the password reset mechanism. The issue results from the lack of restriction of excessive authentication attempts. An attacker can leverage this vulnerability to reset a user's password and bypass authentication on the system. Was ZDI-CAN-24164.
References
Link | Resource |
---|---|
https://support.logsign.net/hc/en-us/articles/19316621924754-03-06-2024-Version-6-4-8-Release-Notes | Patch |
https://www.zerodayinitiative.com/advisories/ZDI-24-616/ | Third Party Advisory |
Configurations
History
10 Jul 2025, 16:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:logsign:unified_secops_platform:*:*:*:*:*:*:*:* | |
References | () https://support.logsign.net/hc/en-us/articles/19316621924754-03-06-2024-Version-6-4-8-Release-Notes - Patch | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-24-616/ - Third Party Advisory | |
First Time |
Logsign
Logsign unified Secops Platform |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Information
Published : 2024-11-22 20:15
Updated : 2025-07-10 16:09
NVD link : CVE-2024-5716
Mitre link : CVE-2024-5716
CVE.ORG link : CVE-2024-5716
JSON object : View
Products Affected
logsign
- unified_secops_platform
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts