Refine your search
1 vulnerability found for SecureCore Technology 4 by Phoenix
CVE-2024-12533 (GCVE-0-2024-12533)
Vulnerability from cvelistv5
Published
2025-05-13 14:56
Modified
2025-07-28 20:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-754 - Improper Check for Unusual or Exceptional Conditions
Summary
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Phoenix | SecureCore Technology 4 |
Version: 4.0.1.0 < 4.0.1.1018 Version: 4.1.0.1 < 4.1.0.573 Version: 4.2.0.1 < 4.2.0.338 Version: 4.2.1.1 < 4.2.1.300 Version: 4.3.0.1 < 4.3.0.244 Version: 4.3.1.1 < 4.3.1.187 Version: 4.4.0.1 < 4.4.0.299 Version: 4.5.0.1 < 4.5.0.231 Version: 4.5.1.1 < 4.5.1.103 Version: 4.5.5.1 < 4.5.5.36 Version: 4.6.0.1 < 4.6.0.67 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-12533",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-13T15:15:02.413134Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-13T15:15:09.100Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "SecureCore Technology 4",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.0.1.1018",
"status": "affected",
"version": "4.0.1.0",
"versionType": "custom"
},
{
"lessThan": "4.1.0.573",
"status": "affected",
"version": "4.1.0.1",
"versionType": "custom"
},
{
"lessThan": "4.2.0.338",
"status": "affected",
"version": "4.2.0.1",
"versionType": "custom"
},
{
"lessThan": "4.2.1.300",
"status": "affected",
"version": "4.2.1.1",
"versionType": "custom"
},
{
"lessThan": "4.3.0.244",
"status": "affected",
"version": "4.3.0.1",
"versionType": "custom"
},
{
"lessThan": "4.3.1.187",
"status": "affected",
"version": "4.3.1.1",
"versionType": "custom"
},
{
"lessThan": "4.4.0.299",
"status": "affected",
"version": "4.4.0.1",
"versionType": "custom"
},
{
"lessThan": "4.5.0.231",
"status": "affected",
"version": "4.5.0.1",
"versionType": "custom"
},
{
"lessThan": "4.5.1.103",
"status": "affected",
"version": "4.5.1.1",
"versionType": "custom"
},
{
"lessThan": "4.5.5.36",
"status": "affected",
"version": "4.5.5.1",
"versionType": "custom"
},
{
"lessThan": "4.6.0.67",
"status": "affected",
"version": "4.6.0.1",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.\u003cp\u003eThis issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.\u003c/p\u003e"
}
],
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-754",
"description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:55:52.706Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-12533/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2024-12533",
"datePublished": "2025-05-13T14:56:41.235Z",
"dateReserved": "2024-12-11T17:37:28.103Z",
"dateUpdated": "2025-07-28T20:55:52.706Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}