The default configuration in ETSI Open-Source MANO (OSM) v.14.x, v.15.x, v.16.x, v.17.x does not impose any restrictions on the authentication attempts performed by the default admin user, allowing a remote attacker to escalate privileges.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Aug 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue in ETSI Open-Source MANO (OSM) v.14.x, v.15.x allows a remote attacker to escalate privileges via not imposing any restrictions on the authentication attempts performed by an admin user | The default configuration in ETSI Open-Source MANO (OSM) v.14.x, v.15.x, v.16.x, v.17.x does not impose any restrictions on the authentication attempts performed by the default admin user, allowing a remote attacker to escalate privileges. |
Mon, 18 Aug 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 25 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-269 | |
Metrics |
cvssV3_1
|
Fri, 25 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue in ETSI Open-Source MANO (OSM) v.14.x, v.15.x allows a remote attacker to escalate privileges via not imposing any restrictions on the authentication attempts performed by an admin user | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-07-25T00:00:00.000Z
Updated: 2025-08-18T19:37:17.335Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48730

Updated: 2025-07-25T20:17:12.810Z

Status : Awaiting Analysis
Published: 2025-07-25T15:15:26.210
Modified: 2025-08-18T20:15:27.910
Link: CVE-2024-48730

No data.