{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T05:01:49.016","vulnerabilities":[{"cve":{"id":"CVE-2024-55570","sourceIdentifier":"cve@mitre.org","published":"2025-03-03T16:15:38.900","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"/api/user/users in the web GUI for the Cubro EXA48200 network packet broker (build 20231025055018) fixed in V5.0R14.5P4-V3.3R1 allows remote authenticated users of the application to increase their privileges by sending a single HTTP PUT request with rolename=Administrator, aka incorrect access control."},{"lang":"es","value":"/api/user/users en la GUI web para el agente de paquetes de red Cubro EXA48200 (compilación 20231025055018) corregido en V5.0R14.5P4-V3.3R1 permite que los usuarios remotos autenticados de la aplicación aumenten sus privilegios enviando una única solicitud HTTP PUT con rolename=Administrator, también conocido como control de acceso incorrecto."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-266"}]}],"references":[{"url":"https://herolab.usd.de/security-advisories/","source":"cve@mitre.org"},{"url":"https://herolab.usd.de/security-advisories/usd-2024-0014/","source":"cve@mitre.org"}]}}]}