CVE-2024-48730

The default configuration in ETSI Open-Source MANO (OSM) v.14.x, v.15.x, v.16.x, v.17.x does not impose any restrictions on the authentication attempts performed by the default admin user, allowing a remote attacker to escalate privileges.
Configurations

No configuration.

History

18 Aug 2025, 20:15

Type Values Removed Values Added
Summary (en) An issue in ETSI Open-Source MANO (OSM) v.14.x, v.15.x allows a remote attacker to escalate privileges via not imposing any restrictions on the authentication attempts performed by an admin user (en) The default configuration in ETSI Open-Source MANO (OSM) v.14.x, v.15.x, v.16.x, v.17.x does not impose any restrictions on the authentication attempts performed by the default admin user, allowing a remote attacker to escalate privileges.

18 Aug 2025, 13:15

Type Values Removed Values Added
Summary
  • (es) Un problema en ETSI Open-Source MANO (OSM) v.14.x, v.15.x permite que un atacante remoto escale privilegios al no imponer ninguna restricción en los intentos de autenticación realizados por un usuario administrador.
References
  • {'url': 'http://etsi.com', 'source': 'cve@mitre.org'}
  • {'url': 'http://open.com', 'source': 'cve@mitre.org'}

25 Jul 2025, 21:15

Type Values Removed Values Added
CWE CWE-269
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

25 Jul 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-25 15:15

Updated : 2025-08-18 20:15


NVD link : CVE-2024-48730

Mitre link : CVE-2024-48730

CVE.ORG link : CVE-2024-48730


JSON object : View

Products Affected

No product.

CWE
CWE-269

Improper Privilege Management