Logsign Unified SecOps Platform Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the password reset mechanism. The issue results from the lack of restriction of excessive authentication attempts. An attacker can leverage this vulnerability to reset a user's password and bypass authentication on the system. Was ZDI-CAN-24164.
References
Link | Resource |
---|---|
https://support.logsign.net/hc/en-us/articles/19316621924754-03-06-2024-Version-6-4-8-Release-Notes | Patch |
https://www.zerodayinitiative.com/advisories/ZDI-24-616/ | Third Party Advisory |
Configurations
History
10 Jul 2025, 16:09
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
|
First Time |
Logsign
Logsign unified Secops Platform |
|
References | () https://support.logsign.net/hc/en-us/articles/19316621924754-03-06-2024-Version-6-4-8-Release-Notes - Patch | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-24-616/ - Third Party Advisory | |
CPE | cpe:2.3:a:logsign:unified_secops_platform:*:*:*:*:*:*:*:* |
22 Nov 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-22 20:15
Updated : 2025-07-10 16:09
NVD link : CVE-2024-5716
Mitre link : CVE-2024-5716
CVE.ORG link : CVE-2024-5716
JSON object : View
Products Affected
logsign
- unified_secops_platform
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts