-
Notifications
You must be signed in to change notification settings - Fork 37
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
docs: added a new one and revised others (#4694)
* added a new one and revised others * ci: auto-formatting prettier issues --------- Co-authored-by: frederickjoi <[email protected]>
- Loading branch information
1 parent
8231a46
commit fbcd89c
Showing
5 changed files
with
76 additions
and
16 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
48 changes: 48 additions & 0 deletions
48
docs/docs-content/security-bulletins/reports/cve-2024-10963.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
--- | ||
sidebar_label: "CVE-2024-10963" | ||
title: "CVE-2024-10963" | ||
description: "Lifecycle of CVE-2024-10963" | ||
hide_table_of_contents: true | ||
sidebar_class_name: "hide-from-sidebar" | ||
toc_max_heading_level: 2 | ||
tags: ["security", "cve"] | ||
--- | ||
|
||
## CVE Details | ||
|
||
[CVE-2024-10963](https://nvd.nist.gov/vuln/detail/CVE-2024-10963) | ||
|
||
## Last Update | ||
|
||
11/12/2024 | ||
|
||
## NIST CVE Summary | ||
|
||
A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This | ||
vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. | ||
This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals. | ||
|
||
## Our Official Summary | ||
|
||
Investigation is ongoing to determine how this vulnerability impacts our products. | ||
|
||
## CVE Severity | ||
|
||
[7.4](https://nvd.nist.gov/vuln/detail/CVE-2024-10963) | ||
|
||
## Status | ||
|
||
Ongoing | ||
|
||
## Affected Products & Versions | ||
|
||
- Palette Enterprise airgap 4.5.8 | ||
- Palette Enterprise 4.5.8 | ||
- Palette VerteX airgap 4.5.8 | ||
- Palette VerteX 4.5.8 | ||
|
||
## Revision History | ||
|
||
- 1.0 11/12/2024 Initial Publication | ||
- 2.0 11/7/2024 Added Palette Enterprise airgap, Palette Enterprise, VerteX airgap, and Palette VerteX 4.5.8 to Affected | ||
Products |
Oops, something went wrong.