{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T04:20:13.455","vulnerabilities":[{"cve":{"id":"CVE-2024-31415","sourceIdentifier":"CybersecurityCOE@eaton.com","published":"2024-09-13T17:15:11.907","lastModified":"2025-08-26T11:15:30.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Eaton Foreseer software provides the feasibility for the user to configure external servers for multiple purposes such as network management, user management, etc. The software uses encryption to store these configurations securely on the host machine. However, the keys used for this encryption were insecurely stored, which could be abused to possibly change or remove the server configuration."},{"lang":"es","value":"El software Eaton Foreseer ofrece al usuario la posibilidad de configurar servidores externos para múltiples propósitos, como administración de red, administración de usuarios, etc. El software utiliza cifrado para almacenar estas configuraciones de forma segura en la máquina host. Sin embargo, las claves utilizadas para este cifrado se almacenaron de forma insegura, lo que podría utilizarse de forma indebida para cambiar o eliminar la configuración del servidor."}],"metrics":{"cvssMetricV31":[{"source":"CybersecurityCOE@eaton.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":0.8,"impactScore":5.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"CybersecurityCOE@eaton.com","type":"Secondary","description":[{"lang":"en","value":"CWE-312"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-522"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eaton:foreseer_electrical_power_monitoring_system:*:*:*:*:*:*:*:*","versionEndExcluding":"7.8.600","matchCriteriaId":"9F67BFC9-4D31-42C3-804D-C7F0B6CA8E89"}]}]}],"references":[{"url":"https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf","source":"CybersecurityCOE@eaton.com","tags":["Mitigation","Vendor Advisory"]}]}}]}