Search for vulnerabilities
Vulnerability details: VCID-66m3-refr-quf4
Vulnerability ID VCID-66m3-refr-quf4
Aliases CVE-2024-7347
Summary Buffer overread in the ngx_http_mp4_module
Status Published
Exploitability 0.5
Weighted Severity 4.2
Risk 2.1
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
cvssv3 4.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7347.json
epss 0.00067 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00067 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00067 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
cvssv3.1 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
generic_textual low https://mailman.nginx.org/pipermail/nginx-announce/2024/UUOCLLONPR6244YQYU65PO5LB7JDYCWM.html
cvssv3.1 4.7 https://my.f5.com/manage/s/article/K000140529
cvssv4 5.7 https://my.f5.com/manage/s/article/K000140529
ssvc Track https://my.f5.com/manage/s/article/K000140529
cvssv3.1 4.7 https://nvd.nist.gov/vuln/detail/CVE-2024-7347
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7347.json
https://api.first.org/data/v1/epss?cve=CVE-2024-7347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7347
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://mailman.nginx.org/pipermail/nginx-announce/2024/UUOCLLONPR6244YQYU65PO5LB7JDYCWM.html
https://nginx.org/download/patch.2024.mp4.txt
https://nginx.org/download/patch.2024.mp4.txt.asc
http://www.openwall.com/lists/oss-security/2024/08/14/4
1078971 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078971
2304966 https://bugzilla.redhat.com/show_bug.cgi?id=2304966
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_open_source:1.27.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx_open_source:1.27.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r31:p1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx_plus:r31:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx_plus:r32:-:*:*:*:*:*:*
CVE-2024-7347 https://nvd.nist.gov/vuln/detail/CVE-2024-7347
K000140529 https://my.f5.com/manage/s/article/K000140529
RHSA-2025:3261 https://access.redhat.com/errata/RHSA-2025:3261
RHSA-2025:3262 https://access.redhat.com/errata/RHSA-2025:3262
RHSA-2025:7402 https://access.redhat.com/errata/RHSA-2025:7402
RHSA-2025:7542 https://access.redhat.com/errata/RHSA-2025:7542
RHSA-2025:7546 https://access.redhat.com/errata/RHSA-2025:7546
RHSA-2025:7548 https://access.redhat.com/errata/RHSA-2025:7548
RHSA-2025:7549 https://access.redhat.com/errata/RHSA-2025:7549
RHSA-2025:7619 https://access.redhat.com/errata/RHSA-2025:7619
USN-7014-1 https://usn.ubuntu.com/7014-1/
USN-7014-2 https://usn.ubuntu.com/7014-2/
USN-7014-3 https://usn.ubuntu.com/7014-3/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7347.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://my.f5.com/manage/s/article/K000140529
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Found at https://my.f5.com/manage/s/article/K000140529
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-14T15:27:31Z/ Found at https://my.f5.com/manage/s/article/K000140529
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-7347
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.21227
EPSS Score 0.00067
Published At Aug. 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:03:11.907690+00:00 Nginx Importer Import https://nginx.org/en/security_advisories.html 37.0.0