Search for vulnerabilities
Vulnerability details: VCID-cxwd-3afk-6ufm
Vulnerability ID VCID-cxwd-3afk-6ufm
Aliases CVE-2024-10396
Summary An authenticated user can provide a malformed ACL to the fileserver's StoreACL RPC, causing the fileserver to crash, possibly expose uninitialized memory, and possibly store garbage data in the audit log. Malformed ACLs provided in responses to client FetchACL RPCs can cause client processes to crash and possibly expose uninitialized memory into other ACLs stored on the server.
Status Published
Exploitability 0.5
Weighted Severity 3.5
Risk 1.8
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00114 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00155 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00156 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00159 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
epss 0.00239 https://api.first.org/data/v1/epss?cve=CVE-2024-10396
cvssv3.1 0 https://openafs.org/pages/security/OPENAFS-SA-2024-002.txt
cvssv4 7.1 https://openafs.org/pages/security/OPENAFS-SA-2024-002.txt
ssvc Track https://openafs.org/pages/security/OPENAFS-SA-2024-002.txt
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N Found at https://openafs.org/pages/security/OPENAFS-SA-2024-002.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N Found at https://openafs.org/pages/security/OPENAFS-SA-2024-002.txt
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:58:56Z/ Found at https://openafs.org/pages/security/OPENAFS-SA-2024-002.txt
Exploit Prediction Scoring System (EPSS)
Percentile 0.10184
EPSS Score 0.00043
Published At Nov. 18, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-11-18T17:42:00.596980+00:00 Debian Importer Import https://security-tracker.debian.org/tracker/data/json 34.3.2