Lucene search

K
vulnrichmentCERT-PLVULNRICHMENT:CVE-2024-3699
HistoryJun 10, 2024 - 11:18 a.m.

CVE-2024-3699 Hardcoded password in drEryk Gabinet

2024-06-1011:18:16
CWE-798
CERT-PL
github.com
3
cve-2024-3699
hardcoded password
dreryk gabinet
sensitive data
database security
software vulnerability

CVSS4

9.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:H/SI:H/VA:H/SA:H/AU:Y/U:Red/R:U/V:C/RE:M

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Use of hard-coded password to the patients’ database allows an attacker to retrieve sensitive data stored in the database. The password is the same among allΒ drEryk Gabinet installations.This issue affects drEryk Gabinet software versions from 7.0.0.0 through 9.17.0.0.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:dreryk:gabinet:*:*:*:*:*:*:*:*"
    ],
    "vendor": "dreryk",
    "product": "gabinet",
    "versions": [
      {
        "status": "affected",
        "version": "7.0.0.0",
        "versionType": "custom",
        "lessThanOrEqual": "9.17.0.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS4

9.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:H/SI:H/VA:H/SA:H/AU:Y/U:Red/R:U/V:C/RE:M

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-3699