CVE-2024-29502

An issue in Secure Lockdown Multi Application Edition v2.00.219 allows attackers to read arbitrary files via using UNC paths.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inteset:secure_lockdown:2.00.219:*:*:*:multi_application:*:*:*

History

17 Jun 2025, 20:56

Type Values Removed Values Added
References () https://raeph123.github.io/BlogPosts/inteset/Inteset_Secure_Lockdown_Multi_Application_Edition_-_Vulnerabilities_and_Hardening_Measures_en.html - () https://raeph123.github.io/BlogPosts/inteset/Inteset_Secure_Lockdown_Multi_Application_Edition_-_Vulnerabilities_and_Hardening_Measures_en.html - Exploit
References () https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening - () https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening - Broken Link
CPE cpe:2.3:a:inteset:secure_lockdown:2.00.219:*:*:*:multi_application:*:*:*
First Time Inteset
Inteset secure Lockdown

15 Apr 2025, 22:15

Type Values Removed Values Added
References
  • () https://raeph123.github.io/BlogPosts/inteset/Inteset_Secure_Lockdown_Multi_Application_Edition_-_Vulnerabilities_and_Hardening_Measures_en.html -

10 Feb 2025, 23:15

Type Values Removed Values Added
CWE CWE-22
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

21 Nov 2024, 09:08

Type Values Removed Values Added
References () https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening - () https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening -

10 Apr 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-10 20:15

Updated : 2025-06-17 20:56


NVD link : CVE-2024-29502

Mitre link : CVE-2024-29502

CVE.ORG link : CVE-2024-29502


JSON object : View

Products Affected

inteset

  • secure_lockdown
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')