Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46145 | An attacker who can execute arbitrary Operating Systems commands, can bypass code signing enforcements in the kernel, and execute arbitrary native code. This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 03 Dec 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Dec 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lorextechnology
Lorextechnology w461asc-e Firmware |
|
| CPEs | cpe:2.3:o:lorextechnology:w461asc-e_firmware:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Lorextechnology
Lorextechnology w461asc-e Firmware |
|
| Metrics |
ssvc
|
Tue, 03 Dec 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker who can execute arbitrary Operating Systems commands, can bypass code signing enforcements in the kernel, and execute arbitrary native code. This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111. | |
| Title | Lorex 2K Indoor Wi-Fi Security Camera - Code signing bypass | |
| Weaknesses | CWE-345 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2024-12-03T21:04:00.985Z
Reserved: 2024-11-12T13:42:42.324Z
Link: CVE-2024-52548
Updated: 2024-12-03T18:37:50.260Z
Status : Received
Published: 2024-12-03T18:15:16.023
Modified: 2024-12-03T22:15:05.567
Link: CVE-2024-52548
No data.
OpenCVE Enrichment
No data.
EUVD