{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T14:45:03.570","vulnerabilities":[{"cve":{"id":"CVE-2024-10905","sourceIdentifier":"psirt@sailpoint.com","published":"2024-12-02T15:15:10.240","lastModified":"2025-11-12T15:49:07.857","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"IdentityIQ 8.4 and all 8.4 patch levels prior to 8.4p2, IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p5, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p8, and all prior versions allow HTTP/HTTPS access to static content in the IdentityIQ application directory that should be protected."},{"lang":"es","value":"IdentityIQ 8.4 y todos los niveles de parche 8.4 anteriores a 8.4p2, IdentityIQ 8.3 y todos los niveles de parche 8.3 anteriores a 8.3p5, IdentityIQ 8.2 y todos los niveles de parche 8.2 anteriores a 8.2p8, y todas las versiones anteriores permiten el acceso HTTP a contenido estático en el directorio de la aplicación IdentityIQ que debe estar protegido."}],"metrics":{"cvssMetricV31":[{"source":"psirt@sailpoint.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@sailpoint.com","type":"Secondary","description":[{"lang":"en","value":"CWE-66"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sailpoint:identityiq:*:*:*:*:*:*:*:*","versionEndExcluding":"8.2","matchCriteriaId":"0A31EEA4-6703-4B64-AAD4-A9FCA993C156"},{"vulnerable":true,"criteria":"cpe:2.3:a:sailpoint:identityiq:8.2:-:*:*:*:*:*:*","matchCriteriaId":"224129BF-667F-4F6A-8E9A-15390F6FA3D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:sailpoint:identityiq:8.2:patch1:*:*:*:*:*:*","matchCriteriaId":"2A8C2668-C1F1-4A67-A2B3-99B5746C6A52"},{"vulnerable":true,"criteria":"cpe:2.3:a:sailpoint:identityiq:8.2:patch2:*:*:*:*:*:*","matchCriteriaId":"A9D91EB5-EC8E-4200-9245-13E37312343D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sailpoint:identityiq:8.2:patch4:*:*:*:*:*:*","matchCriteriaId":"63352C53-ADD8-49CD-B9E6-648183BDED68"},{"vulnerable":true,"criteria":"cpe:2.3:a:sailpoint:identityiq:8.2:patch5:*:*:*:*:*:*","matchCriteriaId":"DBDD484D-BF0D-4246-9701-0BF3DD2194E4"},{"vulnerable":true,"criteria":"cpe:2.3:a:sailpoint:identityiq:8.2:patch7:*:*:*:*:*:*","matchCriteriaId":"6DC90C12-F7B6-4CF1-9B7D-A329E8BE79EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:sailpoint:identityiq:8.3:-:*:*:*:*:*:*","matchCriteriaId":"1173CC53-CBE5-450C-96BF-8583D1B3D185"},{"vulnerable":true,"criteria":"cpe:2.3:a:sailpoint:identityiq:8.3:patch1:*:*:*:*:*:*","matchCriteriaId":"2C0F5E55-5D33-425F-9DA7-49FE66CD84C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:sailpoint:identityiq:8.3:patch2:*:*:*:*:*:*","matchCriteriaId":"1A2FD228-E6DB-49E3-BE3E-1BF9B0434FC0"},{"vulnerable":true,"criteria":"cpe:2.3:a:sailpoint:identityiq:8.3:patch4:*:*:*:*:*:*","matchCriteriaId":"0652D99D-DC1E-4E22-8E7D-AE080494C50B"},{"vulnerable":true,"criteria":"cpe:2.3:a:sailpoint:identityiq:8.4:-:*:*:*:*:*:*","matchCriteriaId":"4BC4F08D-A3FB-41F6-8EFD-6F34FBC0F75F"},{"vulnerable":true,"criteria":"cpe:2.3:a:sailpoint:identityiq:8.4:patch1:*:*:*:*:*:*","matchCriteriaId":"4ECFADA6-BB7B-4228-9434-B92B2FF21481"}]}]}],"references":[{"url":"https://www.sailpoint.com/security-advisories/identityiq-improper-access-control-vulnerability-cve-2024-10905","source":"psirt@sailpoint.com","tags":["Vendor Advisory"]}]}}]}