Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-7828

Опубликовано: 19 нояб. 2014
Источник: nvd
CVSS2: 3.5
EPSS Низкий

Описание

FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote attackers to bypass the password requirement of the two-factor authentication leveraging an enabled OTP token, which triggers an anonymous bind.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:freeipa:freeipa:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:freeipa:freeipa:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:freeipa:freeipa:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:freeipa:freeipa:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:freeipa:freeipa:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:freeipa:freeipa:4.1.1:*:*:*:*:*:*:*

EPSS

Процентиль: 61%
0.00407
Низкий

3.5 Low

CVSS2

Дефекты

CWE-264

Связанные уязвимости

ubuntu
около 11 лет назад

FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote attackers to bypass the password requirement of the two-factor authentication leveraging an enabled OTP token, which triggers an anonymous bind.

redhat
больше 11 лет назад

FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote attackers to bypass the password requirement of the two-factor authentication leveraging an enabled OTP token, which triggers an anonymous bind.

debian
около 11 лет назад

FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled ...

github
больше 3 лет назад

FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote attackers to bypass the password requirement of the two-factor authentication leveraging an enabled OTP token, which triggers an anonymous bind.

EPSS

Процентиль: 61%
0.00407
Низкий

3.5 Low

CVSS2

Дефекты

CWE-264