Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API.
Metrics
Affected Vendors & Products
References
History
Fri, 02 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:bludit:bludit:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: NCSC.ch
Published: 2024-06-24T07:11:36.377Z
Updated: 2024-08-01T23:19:52.903Z
Reserved: 2024-01-25T14:02:00.527Z
Link: CVE-2024-24554
Updated: 2024-08-01T23:19:52.903Z
Status : Analyzed
Published: 2024-06-24T08:15:09.130
Modified: 2026-01-02T20:20:41.453
Link: CVE-2024-24554
No data.