Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.FORTRA_FILECATALYST_WORKFLOW_CVE-2024-6633.NBIN
HistoryAug 30, 2024 - 12:00 a.m.

Fortra FileCatalyst Workflow HSQLDB Static Password (CVE-2024-6633)

2024-08-3000:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
2
fortra filecatalyst workflow
hsqldb
static password
cve-2024-6633
binary data
scanner

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

EPSS

0.001

Percentile

39.6%

The Fortra FileCatalyst Workflow running on the remote host is affected by a static password vulnerability. An unauthenticated, remote attacker can, via specifically crafted messages, to access the HSQLDB database.

Binary data fortra_filecatalyst_workflow_cve-2024-6633.nbin

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

EPSS

0.001

Percentile

39.6%

Related for FORTRA_FILECATALYST_WORKFLOW_CVE-2024-6633.NBIN