CVE-2024-9537

ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sciencelogic:sl1:*:*:*:*:*:*:*:*
cpe:2.3:a:sciencelogic:sl1:*:*:*:*:*:*:*:*

History

22 Oct 2024, 17:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:sciencelogic:sl1:*:*:*:*:*:*:*:*
First Time Sciencelogic sl1
Sciencelogic
References () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-9537 - () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-9537 - Third Party Advisory, US Government Resource
References () https://support.sciencelogic.com/s/article/15527 - () https://support.sciencelogic.com/s/article/15527 - Permissions Required
References () https://twitter.com/ynezzor/status/1839931641172467907 - () https://twitter.com/ynezzor/status/1839931641172467907 - Third Party Advisory
References () https://www.theregister.com/2024/09/30/rackspace_zero_day_attack/ - () https://www.theregister.com/2024/09/30/rackspace_zero_day_attack/ - Press/Media Coverage
References () https://rackspace.service-now.com/system_status?id=detailed_status&service=4dafca5a87f41610568b206f8bbb35a6 - () https://rackspace.service-now.com/system_status?id=detailed_status&service=4dafca5a87f41610568b206f8bbb35a6 - Third Party Advisory
References () https://support.sciencelogic.com/s/article/15465 - () https://support.sciencelogic.com/s/article/15465 - Permissions Required
References () https://arcticwolf.com/resources/blog/rackspace-breach-linked-to-zero-day-vulnerability-sciencelogic-sl1s-third-party-utility/ - () https://arcticwolf.com/resources/blog/rackspace-breach-linked-to-zero-day-vulnerability-sciencelogic-sl1s-third-party-utility/ - Press/Media Coverage
References () https://www.bleepingcomputer.com/news/security/rackspace-monitoring-data-stolen-in-sciencelogic-zero-day-attack/ - () https://www.bleepingcomputer.com/news/security/rackspace-monitoring-data-stolen-in-sciencelogic-zero-day-attack/ - Press/Media Coverage
References () https://community.sciencelogic.com/blog/latest-kb-articles-and-known-issues-blog-board/week-of-september-30-2024---latest-kb-articles-and-known-issues-part-1-of-2/1690 - () https://community.sciencelogic.com/blog/latest-kb-articles-and-known-issues-blog-board/week-of-september-30-2024---latest-kb-articles-and-known-issues-part-1-of-2/1690 - Vendor Advisory
CWE NVD-CWE-noinfo

21 Oct 2024, 17:10

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-9537 -

18 Oct 2024, 20:15

Type Values Removed Values Added
References
  • () https://community.sciencelogic.com/blog/latest-kb-articles-and-known-issues-blog-board/week-of-september-30-2024---latest-kb-articles-and-known-issues-part-1-of-2/1690 -

18 Oct 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-18 15:15

Updated : 2024-10-22 17:33


NVD link : CVE-2024-9537

Mitre link : CVE-2024-9537


JSON object : View

Products Affected

sciencelogic

  • sl1