CVE-2024-12533 (GCVE-0-2024-12533)
Vulnerability from cvelistv5
Published
2025-05-13 14:56
Modified
2025-07-28 20:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-754 - Improper Check for Unusual or Exceptional Conditions
Summary
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Phoenix | SecureCore Technology 4 |
Version: 4.0.1.0 < 4.0.1.1018 Version: 4.1.0.1 < 4.1.0.573 Version: 4.2.0.1 < 4.2.0.338 Version: 4.2.1.1 < 4.2.1.300 Version: 4.3.0.1 < 4.3.0.244 Version: 4.3.1.1 < 4.3.1.187 Version: 4.4.0.1 < 4.4.0.299 Version: 4.5.0.1 < 4.5.0.231 Version: 4.5.1.1 < 4.5.1.103 Version: 4.5.5.1 < 4.5.5.36 Version: 4.6.0.1 < 4.6.0.67 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-12533", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-13T15:15:02.413134Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-13T15:15:09.100Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SecureCore Technology 4", "vendor": "Phoenix", "versions": [ { "lessThan": "4.0.1.1018", "status": "affected", "version": "4.0.1.0", "versionType": "custom" }, { "lessThan": "4.1.0.573", "status": "affected", "version": "4.1.0.1", "versionType": "custom" }, { "lessThan": "4.2.0.338", "status": "affected", "version": "4.2.0.1", "versionType": "custom" }, { "lessThan": "4.2.1.300", "status": "affected", "version": "4.2.1.1", "versionType": "custom" }, { "lessThan": "4.3.0.244", "status": "affected", "version": "4.3.0.1", "versionType": "custom" }, { "lessThan": "4.3.1.187", "status": "affected", "version": "4.3.1.1", "versionType": "custom" }, { "lessThan": "4.4.0.299", "status": "affected", "version": "4.4.0.1", "versionType": "custom" }, { "lessThan": "4.5.0.231", "status": "affected", "version": "4.5.0.1", "versionType": "custom" }, { "lessThan": "4.5.1.103", "status": "affected", "version": "4.5.1.1", "versionType": "custom" }, { "lessThan": "4.5.5.36", "status": "affected", "version": "4.5.5.1", "versionType": "custom" }, { "lessThan": "4.6.0.67", "status": "affected", "version": "4.6.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.\u003cp\u003eThis issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.\u003c/p\u003e" } ], "value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-28T20:55:52.706Z", "orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de", "shortName": "Phoenix" }, "references": [ { "url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-12533/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de", "assignerShortName": "Phoenix", "cveId": "CVE-2024-12533", "datePublished": "2025-05-13T14:56:41.235Z", "dateReserved": "2024-12-11T17:37:28.103Z", "dateUpdated": "2025-07-28T20:55:52.706Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-12533\",\"sourceIdentifier\":\"22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de\",\"published\":\"2025-05-13T15:15:51.877\",\"lastModified\":\"2025-09-25T21:20:24.523\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.\"},{\"lang\":\"es\",\"value\":\"La vulnerabilidad de verificaci\u00f3n incorrecta de condiciones inusuales o excepcionales en Phoenix SecureCore Technology 4 permite la manipulaci\u00f3n de datos de entrada. Este problema afecta a SecureCore Technology 4: desde la versi\u00f3n 4.0.1.0 anterior a la 4.0.1.1018, desde la versi\u00f3n 4.1.0.1 anterior a la 4.1.0.573, desde la versi\u00f3n 4.2.0.1 anterior a la 4.2.0.338, desde la versi\u00f3n 4.2.1.1 anterior a la 4.2.1.300, desde la versi\u00f3n 4.3.0.1 anterior a la 4.3.0.244, desde la versi\u00f3n 4.3.1.1 anterior a la 4.3.1.187, desde la versi\u00f3n 4.4.0.1 anterior a la 4.4.0.299, desde la versi\u00f3n 4.5.0.1 anterior a la 4.5.0.231, desde la versi\u00f3n 4.5.1.1 anterior a la 4.5.1.103, desde la versi\u00f3n 4.5.5.1 anterior a la 4.5.1.103. 4.5.5.36, desde 4.6.0.1 antes de 4.6.0.67.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":3.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.1.0\",\"versionEndExcluding\":\"4.0.1.1018\",\"matchCriteriaId\":\"3A608FB6-778F-469B-86B6-3B39B6811C74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1.0.1\",\"versionEndExcluding\":\"4.1.0.573\",\"matchCriteriaId\":\"1B2BF142-2062-4309-A847-329D80C4C0F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2.0.1\",\"versionEndExcluding\":\"4.2.0.338\",\"matchCriteriaId\":\"614D547E-265D-4704-BF6B-B08F4463F5DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2.1.1\",\"versionEndExcluding\":\"4.2.1.300\",\"matchCriteriaId\":\"69685E91-4F9B-4225-8AD0-0309C33B1029\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.3.0.1\",\"versionEndExcluding\":\"4.3.0.244\",\"matchCriteriaId\":\"54B331BC-65E6-4776-89F8-92170AB9C1FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.3.1.1\",\"versionEndExcluding\":\"4.3.1.187\",\"matchCriteriaId\":\"B7F5CFA4-529E-424F-8F59-2BA9CB58D8F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.4.0.1\",\"versionEndExcluding\":\"4.4.0.299\",\"matchCriteriaId\":\"AB62F18C-5681-48B5-8A6A-C492A0C02035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5.0.1\",\"versionEndExcluding\":\"4.5.0.231\",\"matchCriteriaId\":\"45800082-ACBC-4E84-B4D0-C7D7FFCF23D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5.1.1\",\"versionEndIncluding\":\"4.5.1.103\",\"matchCriteriaId\":\"6649403D-987D-4153-A3CA-36BBFDAB7CA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5.5.1\",\"versionEndExcluding\":\"4.5.5.36\",\"matchCriteriaId\":\"75FE9BD1-958A-48CC-B618-D19BDE6B834F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.6.0.1\",\"versionEndExcluding\":\"4.6.0.67\",\"matchCriteriaId\":\"4E1C2F7E-0D3E-4F73-A34C-69679A676645\"}]}]}],\"references\":[{\"url\":\"https://phoenixtech.com/phoenix-security-notifications/cve-2024-12533/\",\"source\":\"22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-12533\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-13T15:15:02.413134Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-13T15:15:06.197Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Phoenix\", \"product\": \"SecureCore Technology 4\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.0.1.0\", \"lessThan\": \"4.0.1.1018\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.1.0.1\", \"lessThan\": \"4.1.0.573\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.2.0.1\", \"lessThan\": \"4.2.0.338\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.2.1.1\", \"lessThan\": \"4.2.1.300\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.3.0.1\", \"lessThan\": \"4.3.0.244\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.3.1.1\", \"lessThan\": \"4.3.1.187\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.4.0.1\", \"lessThan\": \"4.4.0.299\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.5.0.1\", \"lessThan\": \"4.5.0.231\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.5.1.1\", \"lessThan\": \"4.5.1.103\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.5.5.1\", \"lessThan\": \"4.5.5.36\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.6.0.1\", \"lessThan\": \"4.6.0.67\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://phoenixtech.com/phoenix-security-notifications/cve-2024-12533/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.\u003cp\u003eThis issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-754\", \"description\": \"CWE-754 Improper Check for Unusual or Exceptional Conditions\"}]}], \"providerMetadata\": {\"orgId\": \"22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de\", \"shortName\": \"Phoenix\", \"dateUpdated\": \"2025-07-28T20:55:52.706Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-12533\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-28T20:55:52.706Z\", \"dateReserved\": \"2024-12-11T17:37:28.103Z\", \"assignerOrgId\": \"22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de\", \"datePublished\": \"2025-05-13T14:56:41.235Z\", \"assignerShortName\": \"Phoenix\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…