Search for vulnerabilities
Vulnerability details: VCID-gq6x-91jr-yfcc
Vulnerability ID VCID-gq6x-91jr-yfcc
Aliases CVE-2024-55581
Summary When AdaCore Ada Web Server 25.0.0 is linked with GnuTLS, the default behaviour of AWS.Client is vulnerable to a man-in-the-middle attack because of lack of verification of an HTTPS server's certificate (unless the using program specifies a TLS configuration).
Status Published
Exploitability 0.5
Weighted Severity 3.7
Risk 1.9
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00017 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00023 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00025 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00029 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00029 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00029 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00029 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00029 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00029 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
epss 0.00029 https://api.first.org/data/v1/epss?cve=CVE-2024-55581
cvssv3.1 7.4 https://docs.adacore.com/corp/security-advisories/SEC.AWS-0056-v1.pdf
ssvc Track* https://docs.adacore.com/corp/security-advisories/SEC.AWS-0056-v1.pdf
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://docs.adacore.com/corp/security-advisories/SEC.AWS-0056-v1.pdf
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-04T19:47:08Z/ Found at https://docs.adacore.com/corp/security-advisories/SEC.AWS-0056-v1.pdf
Exploit Prediction Scoring System (EPSS)
Percentile 0.01507
EPSS Score 0.00017
Published At March 29, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-03-28T07:20:09.996570+00:00 Debian Importer Import https://security-tracker.debian.org/tracker/data/json 36.0.0