CVE-2024-6973

Remote Code Execution in Cato Windows SDP client via crafted URLs. This issue affects Windows SDP Client before 5.10.34.
Configurations

Configuration 1 (hide)

cpe:2.3:a:catonetworks:cato_client:*:*:*:*:*:windows:*:*

History

27 Aug 2024, 15:34

Type Values Removed Values Added
CPE cpe:2.3:a:catonetworks:cato_client:*:*:*:*:*:windows:*:*
References () https://support.catonetworks.com/hc/en-us/articles/19756987454237-CVE-2024-6973-Windows-SDP-Client-Remote-Code-Execution-via-crafted-URLsĀ - () https://support.catonetworks.com/hc/en-us/articles/19756987454237-CVE-2024-6973-Windows-SDP-Client-Remote-Code-Execution-via-crafted-URLsĀ - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE NVD-CWE-noinfo
First Time Catonetworks
Catonetworks cato Client

31 Jul 2024, 20:15

Type Values Removed Values Added
Summary Improper Input Validation vulnerability in Cato Networks SDP Client on Windows allows OS Command Injection.This issue affects Windows SDP Client: before 5.10.34. Remote Code Execution in Cato Windows SDP client via crafted URLs. This issue affects Windows SDP Client before 5.10.34.

31 Jul 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-31 17:15

Updated : 2024-08-27 15:34


NVD link : CVE-2024-6973

Mitre link : CVE-2024-6973


JSON object : View

Products Affected

catonetworks

  • cato_client