Dell SCG Policy Manager weak pass reset token leakage (before 5.10)
CVE-2024-24903 Published on March 1, 2024

Dell Secure Connect Gateway (SCG) Policy Manager, version 5.10+, contain a weak password recovery mechanism for forgotten passwords. An adjacent network low privileged attacker could potentially exploit this vulnerability, leading to unauthorized access to the application with privileges of the compromised account. The attacker could retrieve the reset password token without authorization and then perform the password change.

Vendor Advisory NVD

Vulnerability Analysis

Attack Vector:
ADJACENT_NETWORK
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

Weak Password Recovery Mechanism for Forgotten Password

The software contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.


Products Associated with CVE-2024-24903

stack.watch emails you whenever new vulnerabilities are published in Dell Secure Connect Gateway or Dell Policy Manager Secure Connect Gateway. Just hit a watch button to start following.

 
 

Affected Versions

Dell Secure Connect Gateway (SCG) Policy Manager: dell secure_connect_gateway_policy_manager:

Exploit Probability

EPSS
0.08%
Percentile
23.96%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.