Description
REST service authentication anomaly with “valid username/no password” credential combination for batch job processing resulting in successful service invocation. The anomaly doesn’t exist with other credential combinations.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-27200 | REST service authentication anomaly with “valid username/no password” credential combination for batch job processing resulting in successful service invocation. The anomaly doesn’t exist with other credential combinations. |
References
History
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: Hitachi Energy
Published:
Updated: 2024-08-06T20:48:55.300Z
Reserved: 2024-03-07T04:04:01.457Z
Link: CVE-2024-2244
Updated: 2024-08-01T19:03:39.450Z
Status : Deferred
Published: 2024-03-27T02:15:11.417
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-2244
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD