CVE-2024-5275 Vulnerability Details

  /     /     /  

CVE-2024-5275 Metadata Quick Info

CVE Published: 18/06/2024 | CVE Updated: 01/08/2024 | CVE Year: 2024
Source: Fortra | Vendor: Fortra | Product: FileCatalyst Direct
Status : PUBLISHED

CVE-2024-5275 Description

A hard-coded password in the FileCatalyst TransferAgent can be found which can be used to unlock the keystore from which contents may be read out, for example, the private key for certificates. Exploit of this vulnerability could lead to a machine-in-the-middle (MiTM) attack against users of the agent. This issue affects all versions of FileCatalyst Direct from 3.8.10 Build 138 and earlier and all versions of FileCatalyst Workflow from 5.1.6 Build 130 and earlier.

Metrics

CVSS Version: 3.1 | Base Score: 7.8 HIGH
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

l➤ Exploitability Metrics:
    Attack Vector (AV)* LOCAL
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* LOW
    User Interaction (UI)* NONE
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* HIGH
    Availability Impact (A)* HIGH

Weakness Enumeration (CWE)

CWE-ID: CWE-259
CWE Name: CWE-259 Use of Hard-coded Password
Source: Fortra

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-191
CAPEC Description: CAPEC-191 Read Sensitive Constants Within an Executable


Source: NVD (National Vulnerability Database).