Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-12174", "assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "state": "PUBLISHED", "assignerShortName": "tenable", "dateReserved": "2024-12-04T15:35:28.231Z", "datePublished": "2024-12-09T21:38:47.542Z", "dateUpdated": "2024-12-10T17:14:03.468Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "affected", "platforms": ["Linux"], "product": "Security Center", "vendor": "Tenable", "versions": [{"lessThan": "6.5.0", "status": "affected", "version": "0", "versionType": "semver"}]}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "An Improper Certificate Validation vulnerability exists in Tenable Security Center where an authenticated, privileged attacker could intercept email messages sent from Security Center via a rogue SMTP server."}], "value": "An Improper Certificate Validation vulnerability exists in Tenable Security Center where an authenticated, privileged attacker could intercept email messages sent from Security Center via a rogue SMTP server."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "shortName": "tenable", "dateUpdated": "2024-12-09T21:38:47.542Z"}, "references": [{"url": "https://www.tenable.com/security/tns-2024-19"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Tenable has released Security Center 6.5.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: <a target=\"_blank\" rel=\"nofollow\" href=\"https://tenable%20has%20released%20security%20center%206.5.0%20to%20address%20these%20issues.%20the%20installation%20files%20can%20be%20obtained%20from%20the%20tenable%20downloads%20portal:%20https//www.tenable.com/downloads/security-center\">https://www.tenable.com/downloads/security-center</a>\n\n<br>"}], "value": "Tenable has released Security Center 6.5.0 to address these issues. The installation files can be obtained from the Tenable Downloads Portal: https://www.tenable.com/downloads/security-center https://tenable%20has%20released%20security%20center%206.5.0%20to%20address%20these%20issues.%20the%20installation%20files%20can%20be%20obtained%20from%20the%20tenable%20downloads%20portal:%20https//www.tenable.com/downloads/security-center"}], "source": {"advisory": "TNS-2024-19", "discovery": "EXTERNAL"}, "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-12-10T16:08:21.550027Z", "id": "CVE-2024-12174", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-12-10T17:14:03.468Z"}}]}}