The sessions are stored in clear-text logs. An attacker can retrieve authentication sessions. A remote attacker can retrieve the credentials and bypass the authentication mechanism. As for the affected products/models/versions, see the reference URL.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: Toshiba

Published: 2024-06-14T03:22:31.415Z

Updated: 2024-06-14T03:22:31.415Z

Reserved: 2024-02-21T02:11:56.735Z


Link: CVE-2024-27157

JSON object: View

cve-icon NVD Information

Status : Awaiting Analysis

Published: 2024-06-14T04:15:26.607

Modified: 2024-06-17T12:42:04.623


Link: CVE-2024-27157

JSON object: View

cve-icon Redhat Information

No data.

CWE