CVE-2024-5716

Logsign Unified SecOps Platform Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability. The specific flaw exists within the password reset mechanism. The issue results from the lack of restriction of excessive authentication attempts. An attacker can leverage this vulnerability to reset a user's password and bypass authentication on the system. Was ZDI-CAN-24164.
Configurations

Configuration 1 (hide)

cpe:2.3:a:logsign:unified_secops_platform:*:*:*:*:*:*:*:*

History

10 Jul 2025, 16:09

Type Values Removed Values Added
CPE cpe:2.3:a:logsign:unified_secops_platform:*:*:*:*:*:*:*:*
References () https://support.logsign.net/hc/en-us/articles/19316621924754-03-06-2024-Version-6-4-8-Release-Notes - () https://support.logsign.net/hc/en-us/articles/19316621924754-03-06-2024-Version-6-4-8-Release-Notes - Patch
References () https://www.zerodayinitiative.com/advisories/ZDI-24-616/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-616/ - Third Party Advisory
First Time Logsign
Logsign unified Secops Platform
CVSS v2 : unknown
v3 : 8.6
v2 : unknown
v3 : 9.8

Information

Published : 2024-11-22 20:15

Updated : 2025-07-10 16:09


NVD link : CVE-2024-5716

Mitre link : CVE-2024-5716

CVE.ORG link : CVE-2024-5716


JSON object : View

Products Affected

logsign

  • unified_secops_platform
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts