Weak JWT Secret vulnerabilitiy in EasyVirt DCScope <= 8.6.0 and CO2Scope <= 1.3.0 allows remote attackers to generate JWT for privilege escalation. The HMAC secret used for generating tokens is hardcoded as "somerandomaccesstoken". A weak HMAC secret poses a risk because attackers can use the predictable secret to create valid JSON Web Tokens (JWTs), allowing them access to important information and actions within the application.
Metrics
Affected Vendors & Products
References
History
Fri, 23 May 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Easyvirt
Easyvirt co2scope Easyvirt dcscope |
|
CPEs | cpe:2.3:a:easyvirt:co2scope:*:*:*:*:*:*:*:* cpe:2.3:a:easyvirt:dcscope:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Easyvirt
Easyvirt co2scope Easyvirt dcscope |
Fri, 07 Feb 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | EasyVirt DCScope <=8.6.0 and CO2Scope <=1.3.0 are vulnerable to privilege escalation as the password token suffers from weak encryption making it possible to brute-force the password token. | Weak JWT Secret vulnerabilitiy in EasyVirt DCScope <= 8.6.0 and CO2Scope <= 1.3.0 allows remote attackers to generate JWT for privilege escalation. The HMAC secret used for generating tokens is hardcoded as "somerandomaccesstoken". A weak HMAC secret poses a risk because attackers can use the predictable secret to create valid JSON Web Tokens (JWTs), allowing them access to important information and actions within the application. |
Mon, 03 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-798 | |
Metrics |
cvssV3_1
|
Fri, 31 Jan 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | EasyVirt DCScope <=8.6.0 and CO2Scope <=1.3.0 are vulnerable to privilege escalation as the password token suffers from weak encryption making it possible to brute-force the password token. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-01-31T00:00:00.000Z
Updated: 2025-02-07T16:21:06.385Z
Reserved: 2024-11-20T00:00:00.000Z
Link: CVE-2024-53356

Updated: 2025-02-03T17:56:36.177Z

Status : Analyzed
Published: 2025-01-31T22:15:09.623
Modified: 2025-05-23T15:37:29.137
Link: CVE-2024-53356

No data.