Vulnerability Description
An issue in Ocuco Innovation - REPORTSERVER.EXE v2.10.24.13 allows attackers to bypass authentication and escalate privileges to Administrator via a crafted TCP packet.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ocuco | Innovation | 2.10.24.13 |
Related Weaknesses (CWE)
References
- https://cwe.mitre.org/data/definitions/285.htmlTechnical Description
- https://drive.google.com/file/d/1UqJAQiwhHZCHtgac4-YiJHElBYhqUu3M/view?usp=drivePermissions Required
- https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raExploit
- https://gist.githubusercontent.com/john0x186/1d9cc7fcc8386480d2bdaa9fdcfa914b/raExploit
FAQ
What is CVE-2024-41196?
CVE-2024-41196 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue in Ocuco Innovation - REPORTSERVER.EXE v2.10.24.13 allows attackers to bypass authentication and escalate privileges to Administrator via a crafted TCP packet.
How severe is CVE-2024-41196?
CVE-2024-41196 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-41196?
Check the references section above for vendor advisories and patch information. Affected products include: Ocuco Innovation.