An issue was discovered in Logpoint before 7.5.0. SOAR uses a static JWT secret key to generate tokens that allow access to SOAR API endpoints without authentication. This static key vulnerability enables attackers to create custom JWT secret keys for unauthorized access to these endpoints.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Apr 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Logpoint
Logpoint soar |
|
CPEs | cpe:2.3:a:logpoint:soar:*:*:*:*:*:*:*:* | |
Vendors & Products |
Logpoint
Logpoint soar |
Thu, 07 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-306 | |
Metrics |
cvssV3_1
|
Thu, 07 Nov 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in Logpoint before 7.5.0. SOAR uses a static JWT secret key to generate tokens that allow access to SOAR API endpoints without authentication. This static key vulnerability enables attackers to create custom JWT secret keys for unauthorized access to these endpoints. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2024-11-07T00:00:00
Updated: 2024-11-07T20:03:17.030Z
Reserved: 2024-10-10T00:00:00
Link: CVE-2024-48952

Updated: 2024-11-07T20:03:07.991Z

Status : Analyzed
Published: 2024-11-07T17:15:08.510
Modified: 2025-04-30T16:36:09.680
Link: CVE-2024-48952

No data.