HomeNextcloudCVE-2024-52521

CVE-2024-52521

LOW
2.6CVSS
Published: 2024-11-15
Updated: 2025-01-23
AI Analysis

Description

Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
Attack Vector
network
Complexity
high
Privileges
low
User Action
required
Scope
unchanged
Confidentiality
none
Integrity
low
Availability
none
Weaknesses
CWE-328NVD-CWE-Other

Metadata

Primary Vendor
NEXTCLOUD
Published
11/15/2024
Last Modified
1/23/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

nextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_server

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief