A Use of Single-factor Authentication vulnerability in the Authentication component of CIPPlanner CIPAce before 9.17 allows attackers to bypass a protection mechanism. When the system is configured to allow login with internal accounts, an attacker can possibly obtain full authentication if the secret in a single-factor authentication scheme gets compromised.
References
| Link | Resource |
|---|---|
| https://cipplanner.com/cve-2024-50618-cve-public-notification-of-resolution/ | Vendor Advisory |
Configurations
History
17 Feb 2026, 15:01
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cipplanner.com/cve-2024-50618-cve-public-notification-of-resolution/ - Vendor Advisory | |
| First Time |
Cipplanner cipace
Cipplanner |
|
| CPE | cpe:2.3:a:cipplanner:cipace:*:*:*:*:*:*:*:* |
12 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
| CWE | CWE-308 |
11 Feb 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-11 20:16
Updated : 2026-02-17 15:01
NVD link : CVE-2024-50618
Mitre link : CVE-2024-50618
CVE.ORG link : CVE-2024-50618
JSON object : View
Products Affected
cipplanner
- cipace
CWE
CWE-308
Use of Single-factor Authentication
