We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-6364

Server Identity Validation Bypass in Absolute Persistence®



Description

A vulnerability in Absolute Persistence® versions before 2.8 exists when it is not activated. This may allow a skilled attacker with both physical access to the device, and full hostile network control, to initiate OS commands on the device. To remediate this vulnerability, update the device firmware to the latest available version. Please contact the device manufacturer for upgrade instructions or contact Absolute Security, see reference below.

Reserved 2024-06-26 | Published 2025-05-13 | Updated 2025-05-13 | Assigner Absolute


MEDIUM: 6.9CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N

Product status

Default status
unaffected

Any version before 2.8
affected

Credits

Denis Faiustov, GMO Cybersecurity by Ierae finder

References

www.absolute.com/...form/vulnerability-archive/cve-2024-6364

cve.org (CVE-2024-6364)

nvd.nist.gov (CVE-2024-6364)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-6364

Support options

Helpdesk Chat, Email, Knowledgebase