CVE-2024-11193

Description

An information disclosure vulnerability exists in Yugabyte Anywhere, where the LDAP bind password is logged in plaintext within application logs. This flaw results in the unintentional exposure of sensitive information in Yugabyte Anywhere logs, potentially allowing unauthorized users with access to these logs to view the LDAP bind password. An attacker with log access could exploit this vulnerability to gain unauthorized access to the LDAP server, leading to potential exposure or compromise of LDAP-managed resources This issue affects YugabyteDB Anywhere: from 2.20.0.0 before 2.20.7.0, from 2.23.0.0 before 2.23.1.0, from 2024.1.0.0 before 2024.1.3.0.

Category

5.0
CVSS
Severity: Medium
CVSS 4.0 •
CVSS 3.1 •
EPSS 0.07%
Affected: YugabyteDB YugabyteDB Anywhere
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-11193?
CVE-2024-11193 has been scored as a medium severity vulnerability.
How to fix CVE-2024-11193?
To fix CVE-2024-11193, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-11193 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-11193 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-11193?
CVE-2024-11193 affects YugabyteDB YugabyteDB Anywhere.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.