Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 23 Dec 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:kerlink:keros:*:*:*:*:*:*:*:* |
Mon, 01 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kerlink
Kerlink keros |
|
| Vendors & Products |
Kerlink
Kerlink keros |
Mon, 01 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-319 | |
| Metrics |
ssvc
|
Mon, 01 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kerlink gateways running KerOS prior to version 5.10 expose their web interface exclusively over HTTP, without HTTPS support. This lack of transport layer security allows a man-in-the-middle attacker to intercept and modify traffic between the client and the device. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-01T16:13:32.231Z
Reserved: 2024-04-12T00:00:00.000Z
Link: CVE-2024-32384
Updated: 2025-12-01T16:12:39.882Z
Status : Analyzed
Published: 2025-12-01T16:15:49.217
Modified: 2025-12-23T15:50:52.083
Link: CVE-2024-32384
No data.
OpenCVE Enrichment
Updated: 2025-12-01T21:27:18Z