Lucene search

K
vulnrichmentFortraVULNRICHMENT:CVE-2024-5275
HistoryJun 18, 2024 - 2:11 p.m.

CVE-2024-5275 Hard-coded password in FileCatalyst Direct 3.8.10 Build 138 TransferAgent (and earlier) and FileCatalyst Workflow 5.1.6 Build 130 (and earlier)

2024-06-1814:11:37
CWE-259
Fortra
github.com
4
cve-2024-5275
filecatalyst
hard-coded password
mitm attack

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A hard-coded password in the FileCatalyst TransferAgent can be found which can be used to unlock the keystore from which contents may be read out, for example, the private key for certificates. Exploit of this vulnerability could lead to a machine-in-the-middle (MiTM) attack against users of the agent. This issue affects all versions of FileCatalyst Direct from 3.8.10 Build 138 and earlier and all versions ofย FileCatalyst Workflow from 5.1.6 Build 130 and earlier.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:fortra:filecatalyst_direct:3.7:*:*:*:*:*:*:*"
    ],
    "vendor": "fortra",
    "product": "filecatalyst_direct",
    "versions": [
      {
        "status": "affected",
        "version": "3.7",
        "lessThan": "3.8.10",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:a:fortra:filecatalyst_workflow:4.9.8:*:*:*:*:*:*:*"
    ],
    "vendor": "fortra",
    "product": "filecatalyst_workflow",
    "versions": [
      {
        "status": "affected",
        "version": "4.9.8",
        "lessThan": "5.1.6",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-5275