Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30176: n/a

0
Medium
VulnerabilityCVE-2024-30176cvecve-2024-30176
Published: Wed May 01 2024 (05/01/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In Logpoint before 7.4.0, an attacker can enumerate a valid list of usernames by using publicly exposed URLs of shared widgets.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 12:03:34 UTC

Technical Analysis

CVE-2024-30176 is a vulnerability identified in Logpoint, a security information and event management (SIEM) platform, affecting versions before 7.4.0. The flaw allows an unauthenticated attacker to enumerate valid usernames by exploiting publicly exposed URLs associated with shared widgets. These shared widgets, intended for data visualization and sharing within the platform, inadvertently leak information that can confirm the existence of user accounts. The vulnerability falls under CWE-203 (Information Exposure Through Discrepancy), where the system's responses differ in a way that reveals sensitive information. The CVSS v3.1 score is 5.3 (medium), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts confidentiality only, with no effect on integrity or availability. No patches or exploit code have been reported yet, but the exposure of valid usernames can aid attackers in reconnaissance phases, increasing the risk of subsequent attacks such as credential stuffing or social engineering. The vulnerability highlights the need for careful access control and information disclosure management in SIEM platforms that handle sensitive security data.

Potential Impact

The primary impact of CVE-2024-30176 is the disclosure of valid usernames to unauthenticated attackers. This can significantly aid adversaries in conducting targeted attacks such as brute force password attempts, credential stuffing, or spear phishing campaigns. While the vulnerability does not directly compromise system integrity or availability, the exposure of user lists undermines the confidentiality of the authentication system and can lead to further exploitation. Organizations relying on Logpoint for security monitoring may face increased risk of account compromise, potentially leading to unauthorized access to sensitive security logs and operational data. This could degrade the effectiveness of security operations and incident response. The medium severity rating reflects the moderate risk posed by this information leak, especially in environments where username enumeration can be leveraged as a stepping stone for more damaging attacks.

Mitigation Recommendations

To mitigate CVE-2024-30176, organizations should immediately review and restrict access to shared widget URLs to trusted users only, ensuring they are not publicly accessible or indexed by search engines. Network-level controls such as firewalls or VPN requirements can limit exposure. Monitoring and logging access to shared widgets can help detect suspicious enumeration attempts. Administrators should upgrade Logpoint installations to version 7.4.0 or later once the patch is available, as this version addresses the vulnerability. Additionally, implementing multi-factor authentication (MFA) for user accounts can reduce the risk posed by username enumeration by making unauthorized access more difficult. Regularly auditing user accounts and removing inactive or unnecessary users can also minimize the attack surface. Finally, educating users about phishing and social engineering risks can help mitigate the downstream effects of username disclosure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-24T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dbcb7ef31ef0b58d700

Added to database: 2/25/2026, 9:46:36 PM

Last enriched: 2/26/2026, 12:03:34 PM

Last updated: 4/12/2026, 3:38:56 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses