EUVD-2024-54999

| CVE-2024-51984 MEDIUM
Insufficiently Protected Credentials (CWE-522)
2025-06-25 [email protected]
6.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

3
Analysis Generated
Mar 15, 2026 - 23:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 23:19 euvd
EUVD-2024-54999
CVE Published
Jun 25, 2025 - 08:15 nvd
MEDIUM 6.8

DescriptionNVD

An authenticated attacker can reconfigure the target device to use an external service (such as LDAP or FTP) controlled by the attacker. If an existing password is present for an external service, the attacker can force the target device to authenticate to an attacker controlled device using the existing credentials for that external service. In the case of an external LDAP or FTP service, this will disclose the plaintext password for that external service to the attacker.

AnalysisAI

A remote code execution vulnerability (CVSS 6.8). Remediation should follow standard vulnerability management procedures.

Technical ContextAI

Vulnerability type: remote code execution.

RemediationAI

Monitor vendor channels for patch availability.

Share

EUVD-2024-54999 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy