{"vulnerability": "cve-2024-49559", "sightings": [{"uuid": "61e47dd8-5335-42af-bc06-9caa826ccba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49559", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114179224013214264", "content": "", "creation_timestamp": "2025-03-17T18:38:15.620418Z"}, {"uuid": "be477533-2516-472a-a692-9bd68e217bb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49559", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkltwzag6p2s", "content": "", "creation_timestamp": "2025-03-17T19:05:51.320252Z"}, {"uuid": "e09ead85-169f-45c3-a6c6-936083bc4025", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49559", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114179499684906960", "content": "", "creation_timestamp": "2025-03-17T19:48:21.678003Z"}, {"uuid": "ee441d67-89ec-4374-b40a-da816cab2ae1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49559", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7816", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49559\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Use of Default Password vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.\n\ud83d\udccf Published: 2025-03-17T17:29:34.032Z\n\ud83d\udccf Modified: 2025-03-17T17:29:34.032Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities\n2. https://www.dell.com/support/kbdoc/en-us/000293638/dsa-2025-069-security-update-for-dell-networking-os10-vulnerabilities\n3. https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities\n4. https://www.dell.com/support/kbdoc/en-us/000294091/dsa-2025-079-security-update-for-dell-networking-os10-vulnerabilities", "creation_timestamp": "2025-03-17T18:31:43.000000Z"}, {"uuid": "6029bc72-7a92-49b1-bddc-793de3a67e53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49559", "type": "seen", "source": "https://t.me/cvedetector/20513", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49559 - Dell SmartFabric OS10 Default Password Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49559 \nPublished : March 17, 2025, 6:15 p.m. | 1\u00a0hour, 49\u00a0minutes ago \nDescription : Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Use of Default Password vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-17T21:39:42.000000Z"}]}