Cleartext Storage of Sensitive Information (CWE-312)
The health endpoint is public, allowing anyone to see a list of all services. This information is potentially valuable for attackers. The vulnerability has a high impact on confidentiality, integrity, and availability. It can be exploited over the network without requiring user interaction or privileges, although the attack complexity is high. The scope of the vulnerability is changed, indicating potential impact beyond the vulnerable component.
This vulnerability could allow attackers to gain unauthorized access to sensitive information about the system's services. With this information, attackers could: 1. Map out the entire service infrastructure, identifying potential targets for further attacks. 2. Discover less secure or unpatched services that could be exploited. 3. Use the information to craft more sophisticated and targeted attacks against specific services. 4. Potentially disrupt or manipulate services, given the high integrity and availability impact. The changed scope suggests that the vulnerability could affect components beyond the initial target, potentially leading to a wider system compromise.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
Based on the provided information, there is no mention of an available patch for this vulnerability.
Given the lack of specific patch information, here are some general mitigation recommendations: 1. Restrict access to the health endpoint immediately, limiting it to authorized personnel only. 2. Implement strong authentication and access controls for all service endpoints. 3. Use network segmentation to isolate critical services from potential external access. 4. Regularly audit and review exposed endpoints and services to ensure only necessary information is publicly accessible. 5. Monitor for unusual access patterns or attempts to enumerate services. 6. Keep all services and systems up-to-date with the latest security patches as they become available. 7. Consider implementing a Web Application Firewall (WAF) to add an extra layer of protection against potential exploits.
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
NVD published the first details for CVE-2024-9798
A CVSS base score of 9 has been assigned.
Feedly found the first article mentioning CVE-2024-9798. See article
Feedly estimated the CVSS score as MEDIUM
EPSS Score was set to: 0.04% (Percentile: 9.7%)