{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T01:35:20.684","vulnerabilities":[{"cve":{"id":"CVE-2024-1243","sourceIdentifier":"41c37e40-543d-43a2-b660-2fee83ea851a","published":"2025-06-11T02:15:20.270","lastModified":"2025-10-01T15:01:48.570","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Improper input validation in the Wazuh agent for Windows prior to version 4.8.0 allows an attacker with control over the Wazuh server or agent key to configure the agent to connect to a malicious UNC path. This results in the leakage of the machine account NetNTLMv2 hash, which can be relayed for remote code execution or used to escalate privileges to SYSTEM via AD CS certificate forging and other similar attacks."},{"lang":"es","value":"La validación de entrada incorrecta en el agente de Wazuh para Windows anterior a la versión 4.8.0 permite que un atacante con control sobre el servidor o la clave del agente de Wazuh configure el agente para conectarse a una ruta UNC maliciosa. Esto provoca la filtración del hash NetNTLMv2 de la cuenta de la máquina, que puede retransmitirse para la ejecución remota de código o utilizarse para escalar privilegios al SYSTEM mediante la falsificación de certificados de AD CS y otros ataques similares."}],"metrics":{"cvssMetricV40":[{"source":"41c37e40-543d-43a2-b660-2fee83ea851a","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.5,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"41c37e40-543d-43a2-b660-2fee83ea851a","type":"Secondary","description":[{"lang":"en","value":"CWE-20"},{"lang":"en","value":"CWE-73"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.0","matchCriteriaId":"7EA778B4-CBE5-4D8A-A08C-358D7F333B98"}]}]}],"references":[{"url":"https://github.com/wazuh/wazuh/security/advisories/GHSA-3crh-39qv-fxj7","source":"41c37e40-543d-43a2-b660-2fee83ea851a","tags":["Exploit","Vendor Advisory"]},{"url":"https://pentraze.com/","source":"41c37e40-543d-43a2-b660-2fee83ea851a","tags":["Product"]},{"url":"https://pentraze.com/vulnerability-reports/CVE-2024-1243/","source":"41c37e40-543d-43a2-b660-2fee83ea851a","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/wazuh/wazuh/security/advisories/GHSA-3crh-39qv-fxj7","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}