Количество 3
Количество 3
CVE-2024-32006
A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 SP2). The affected application does not expire the user session on reboot without logout. This could allow an attacker to bypass Multi-Factor Authentication.
GHSA-5v93-w7mf-hc4q
A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 SP2). The affected application does not expire the user session on reboot without logout. This could allow an attacker to bypass Multi-Factor Authentication.
BDU:2024-09312
Уязвимость алгоритма TOTP (Time-based One-Time Password) клиента VPN-сервиса SINEMA Remote Connect, позволяющая нарушителю обойти процедуру аутентификации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-32006 A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 SP2). The affected application does not expire the user session on reboot without logout. This could allow an attacker to bypass Multi-Factor Authentication. | CVSS3: 4.3 | 0% Низкий | больше 1 года назад | |
GHSA-5v93-w7mf-hc4q A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 SP2). The affected application does not expire the user session on reboot without logout. This could allow an attacker to bypass Multi-Factor Authentication. | CVSS3: 4.3 | 0% Низкий | больше 1 года назад | |
BDU:2024-09312 Уязвимость алгоритма TOTP (Time-based One-Time Password) клиента VPN-сервиса SINEMA Remote Connect, позволяющая нарушителю обойти процедуру аутентификации | CVSS3: 4.3 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу