Vulnerability Description
Webmin before 2.202 and Virtualmin before 7.20.2 allow a network traffic loop via spoofed UDP packets on port 10000.
CVSS Score
7.5
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Virtualmin | Virtualmin | < 7.20.2 |
| Webmin | Webmin | < 2.202 |
Related Weaknesses (CWE)
References
- https://cispa.de/en/loop-dosTechnical Description
- https://webmin.comProduct
- https://www.openwall.com/lists/oss-security/2024/09/04/1Mailing List
FAQ
What is CVE-2024-45692?
CVE-2024-45692 is a vulnerability with a CVSS score of 7.5 (HIGH). Webmin before 2.202 and Virtualmin before 7.20.2 allow a network traffic loop via spoofed UDP packets on port 10000.
How severe is CVE-2024-45692?
CVE-2024-45692 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-45692?
Check the references section above for vendor advisories and patch information. Affected products include: Virtualmin Virtualmin, Webmin Webmin.