ScienceLogic SL1 Unspecified VULN in 3rdParty Component (fixed 12.1.3+)
CVE-2024-9537 Published on October 18, 2024
ScienceLogic SL1 unspecified vulnerability
ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x.
Known Exploited Vulnerability
This ScienceLogic SL1 Unspecified Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component.
The following remediation steps are recommended / required by November 11, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2024-9537 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. This vulnerability is known to be actively exploited by threat actors in an automatable fashion. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
Products Associated with CVE-2024-9537
Want to know whenever a new CVE is published for Sciencelogic Sl1? stack.watch will email you.
Affected Versions
ScienceLogic SL1:- Before 12.1.3 is affected.
- Before 12.2.3 is affected.
- Before 12.3 is affected.
- Before 10.1.x is affected.
- Before 10.2.x is affected.
- Before 11.1.x is affected.
- Before 11.2.x is affected.
- Before 11.3.x is affected.
- Before 12.1.3 is affected.
- Before 12.2.3 is affected.
- Before 12.3 is affected.
- Before 10.1.x is affected.
- Before 10.2.x is affected.
- Before 11.1.x is affected.
- Before 11.2.x is affected.
- Before 11.3.x is affected.
- Before 12.1.3 is affected.
- Before 12.2.3 is affected.
- Before 12.3 is affected.
- Before 10.1.x is affected.
- Before 10.2.x is affected.
- Before 11.1.x is affected.
- Before 11.2.x is affected.
- Before 11.3.x is affected.
- Before 12.1.3 is affected.
- Before 12.2.3 is affected.
- Before 12.3 is affected.
- Before 10.1.x is affected.
- Before 10.2.x is affected.
- Before 11.1.x is affected.
- Before 11.2.x is affected.
- Before 11.3.x is affected.
- Before 12.1.3 is affected.
- Before 12.2.3 is affected.
- Before 12.3 is affected.
- Before 10.1.x is affected.
- Before 10.2.x is affected.
- Before 11.1.x is affected.
- Before 11.2.x is affected.
- Before 11.3.x is affected.
- Before 12.1.3 is affected.
- Before 12.2.3 is affected.
- Before 12.3 is affected.
- Before 10.1.x is affected.
- Before 10.2.x is affected.
- Before 11.1.x is affected.
- Before 11.2.x is affected.
- Before 11.3.x is affected.
- Before 12.1.3 is affected.
- Before 12.2.3 is affected.
- Before 12.3 is affected.
- Before 10.1.x is affected.
- Before 10.2.x is affected.
- Before 11.1.x is affected.
- Before 11.2.x is affected.
- Before 11.3.x is affected.
- Before 12.1.3 is affected.
- Before 12.2.3 is affected.
- Before 12.3 is affected.
- Before 10.1.x is affected.
- Before 10.2.x is affected.
- Before 11.1.x is affected.
- Before 11.2.x is affected.
- Before 11.3.x is affected.
- Before 12.1.3 is affected.
- Before 12.2.3 is affected.
- Before 12.3 is affected.
- Before 10.1.x is affected.
- Before 10.2.x is affected.
- Before 11.1.x is affected.
- Before 11.2.x is affected.
- Before 11.3.x is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.