CVE-2024-36496 (GCVE-0-2024-36496)

Vulnerability from cvelistv5 – Published: 2024-06-24 09:04 – Updated: 2025-02-13 17:52
VLAI?
Title
Hardcoded Credentials
Summary
The configuration file is encrypted with a static key derived from a static five-character password which allows an attacker to decrypt this file. The application hashes this five-character password with the outdated and broken MD5 algorithm (no salt) and uses the first five bytes as the key for RC4. The configuration file is then encrypted with these parameters.
CWE
  • CWE-798 - Use of Hard-coded Credentials
Assigner
Impacted products
Vendor Product Version
Faronics WINSelect (Standard + Enterprise) Unaffected: 8.30.xx.903 (custom)
Create a notification for this product.
Credits
Daniel Hirschberger | SEC Consult Vulnerability Lab
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:faronics:winselect:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "affected",
            "product": "winselect",
            "vendor": "faronics",
            "versions": [
              {
                "status": "unaffected",
                "version": "8.30.xx.903"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-36496",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-26T18:36:38.197133Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-26T18:46:33.744Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T03:37:05.067Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "exploit",
              "x_transferred"
            ],
            "url": "https://r.sec-consult.com/winselect"
          },
          {
            "tags": [
              "release-notes",
              "x_transferred"
            ],
            "url": "https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2024/Jun/12"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "WINSelect (Standard + Enterprise)",
          "vendor": "Faronics",
          "versions": [
            {
              "status": "unaffected",
              "version": "8.30.xx.903",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Daniel Hirschberger | SEC Consult Vulnerability Lab"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cp\u003eThe configuration file is encrypted with a static key derived from a \nstatic five-character password which allows an attacker to decrypt this \nfile.\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eThe application hashes this five-character password with \nthe outdated and broken MD5 algorithm (no salt) and uses the first five \nbytes as the key for RC4. The configuration file is then encrypted with \nthese parameters.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\u003cp\u003e\u003c/p\u003e"
            }
          ],
          "value": "The configuration file is encrypted with a static key derived from a \nstatic five-character password which allows an attacker to decrypt this \nfile.\u00a0The application hashes this five-character password with \nthe outdated and broken MD5 algorithm (no salt) and uses the first five \nbytes as the key for RC4. The configuration file is then encrypted with \nthese parameters."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-37",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-37 Retrieve Embedded Sensitive Data"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-798",
              "description": "CWE-798 Use of Hard-coded Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-25T06:06:09.032Z",
        "orgId": "551230f0-3615-47bd-b7cc-93e92e730bbf",
        "shortName": "SEC-VLab"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://r.sec-consult.com/winselect"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes"
        },
        {
          "url": "http://seclists.org/fulldisclosure/2024/Jun/12"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe vendor provides a patched version 8.30.xx.903 since May 2024 which can be downloaded from the following URL:\u003cbr\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.faronics.com/document-library/document/download-winselect-standard\"\u003ehttps://www.faronics.com/document-library/document/download-winselect-standard\u003c/a\u003e\u003cbr\u003e \u0026nbsp;\u003c/p\u003e\u003cp\u003eThe vendor provided the following changelog:\u003cbr\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes\"\u003ehttps://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes\u003c/a\u003e\u003c/p\u003e\u003cbr\u003e"
            }
          ],
          "value": "The vendor provides a patched version 8.30.xx.903 since May 2024 which can be downloaded from the following URL:\n https://www.faronics.com/document-library/document/download-winselect-standard \n \u00a0\n\nThe vendor provided the following changelog:\n https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Hardcoded Credentials",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "551230f0-3615-47bd-b7cc-93e92e730bbf",
    "assignerShortName": "SEC-VLab",
    "cveId": "CVE-2024-36496",
    "datePublished": "2024-06-24T09:04:18.257Z",
    "dateReserved": "2024-05-29T06:48:49.689Z",
    "dateUpdated": "2025-02-13T17:52:55.434Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The configuration file is encrypted with a static key derived from a \\nstatic five-character password which allows an attacker to decrypt this \\nfile.\\u00a0The application hashes this five-character password with \\nthe outdated and broken MD5 algorithm (no salt) and uses the first five \\nbytes as the key for RC4. The configuration file is then encrypted with \\nthese parameters.\"}, {\"lang\": \"es\", \"value\": \"El archivo de configuraci\\u00f3n est\\u00e1 cifrado con una clave est\\u00e1tica derivada de una contrase\\u00f1a est\\u00e1tica de cinco caracteres que permite a un atacante descifrar este archivo. La aplicaci\\u00f3n codifica esta contrase\\u00f1a de cinco caracteres con el algoritmo MD5 obsoleto y roto (sin semilla) y utiliza los primeros cinco bytes como clave para RC4. Luego, el archivo de configuraci\\u00f3n se cifra con estos par\\u00e1metros.\"}]",
      "id": "CVE-2024-36496",
      "lastModified": "2024-11-21T09:22:17.317",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
      "published": "2024-06-24T09:15:09.860",
      "references": "[{\"url\": \"http://seclists.org/fulldisclosure/2024/Jun/12\", \"source\": \"551230f0-3615-47bd-b7cc-93e92e730bbf\"}, {\"url\": \"https://r.sec-consult.com/winselect\", \"source\": \"551230f0-3615-47bd-b7cc-93e92e730bbf\"}, {\"url\": \"https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes\", \"source\": \"551230f0-3615-47bd-b7cc-93e92e730bbf\"}, {\"url\": \"http://seclists.org/fulldisclosure/2024/Jun/12\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://r.sec-consult.com/winselect\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"551230f0-3615-47bd-b7cc-93e92e730bbf\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-798\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-36496\",\"sourceIdentifier\":\"551230f0-3615-47bd-b7cc-93e92e730bbf\",\"published\":\"2024-06-24T09:15:09.860\",\"lastModified\":\"2024-11-21T09:22:17.317\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The configuration file is encrypted with a static key derived from a \\nstatic five-character password which allows an attacker to decrypt this \\nfile.\u00a0The application hashes this five-character password with \\nthe outdated and broken MD5 algorithm (no salt) and uses the first five \\nbytes as the key for RC4. The configuration file is then encrypted with \\nthese parameters.\"},{\"lang\":\"es\",\"value\":\"El archivo de configuraci\u00f3n est\u00e1 cifrado con una clave est\u00e1tica derivada de una contrase\u00f1a est\u00e1tica de cinco caracteres que permite a un atacante descifrar este archivo. La aplicaci\u00f3n codifica esta contrase\u00f1a de cinco caracteres con el algoritmo MD5 obsoleto y roto (sin semilla) y utiliza los primeros cinco bytes como clave para RC4. Luego, el archivo de configuraci\u00f3n se cifra con estos par\u00e1metros.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"551230f0-3615-47bd-b7cc-93e92e730bbf\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-798\"}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2024/Jun/12\",\"source\":\"551230f0-3615-47bd-b7cc-93e92e730bbf\"},{\"url\":\"https://r.sec-consult.com/winselect\",\"source\":\"551230f0-3615-47bd-b7cc-93e92e730bbf\"},{\"url\":\"https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes\",\"source\":\"551230f0-3615-47bd-b7cc-93e92e730bbf\"},{\"url\":\"http://seclists.org/fulldisclosure/2024/Jun/12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://r.sec-consult.com/winselect\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://r.sec-consult.com/winselect\", \"tags\": [\"third-party-advisory\", \"exploit\", \"x_transferred\"]}, {\"url\": \"https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes\", \"tags\": [\"release-notes\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2024/Jun/12\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T03:37:05.067Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-36496\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-26T18:36:38.197133Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:faronics:winselect:*:*:*:*:*:*:*:*\"], \"vendor\": \"faronics\", \"product\": \"winselect\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8.30.xx.903\"}], \"defaultStatus\": \"affected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-26T18:43:14.360Z\"}}], \"cna\": {\"title\": \"Hardcoded Credentials\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Daniel Hirschberger | SEC Consult Vulnerability Lab\"}], \"impacts\": [{\"capecId\": \"CAPEC-37\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-37 Retrieve Embedded Sensitive Data\"}]}], \"affected\": [{\"vendor\": \"Faronics\", \"product\": \"WINSelect (Standard + Enterprise)\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"8.30.xx.903\", \"versionType\": \"custom\"}], \"defaultStatus\": \"affected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"The vendor provides a patched version 8.30.xx.903 since May 2024 which can be downloaded from the following URL:\\n https://www.faronics.com/document-library/document/download-winselect-standard \\n \\u00a0\\n\\nThe vendor provided the following changelog:\\n https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eThe vendor provides a patched version 8.30.xx.903 since May 2024 which can be downloaded from the following URL:\u003cbr\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.faronics.com/document-library/document/download-winselect-standard\\\"\u003ehttps://www.faronics.com/document-library/document/download-winselect-standard\u003c/a\u003e\u003cbr\u003e \u0026nbsp;\u003c/p\u003e\u003cp\u003eThe vendor provided the following changelog:\u003cbr\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes\\\"\u003ehttps://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes\u003c/a\u003e\u003c/p\u003e\u003cbr\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://r.sec-consult.com/winselect\", \"tags\": [\"third-party-advisory\", \"exploit\"]}, {\"url\": \"https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes\", \"tags\": [\"release-notes\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2024/Jun/12\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The configuration file is encrypted with a static key derived from a \\nstatic five-character password which allows an attacker to decrypt this \\nfile.\\u00a0The application hashes this five-character password with \\nthe outdated and broken MD5 algorithm (no salt) and uses the first five \\nbytes as the key for RC4. The configuration file is then encrypted with \\nthese parameters.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003e\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cp\u003eThe configuration file is encrypted with a static key derived from a \\nstatic five-character password which allows an attacker to decrypt this \\nfile.\u0026nbsp;\u003cspan style=\\\"background-color: var(--wht);\\\"\u003eThe application hashes this five-character password with \\nthe outdated and broken MD5 algorithm (no salt) and uses the first five \\nbytes as the key for RC4. The configuration file is then encrypted with \\nthese parameters.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-798\", \"description\": \"CWE-798 Use of Hard-coded Credentials\"}]}], \"providerMetadata\": {\"orgId\": \"551230f0-3615-47bd-b7cc-93e92e730bbf\", \"shortName\": \"SEC-VLab\", \"dateUpdated\": \"2024-06-25T06:06:09.032Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-36496\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-13T17:52:55.434Z\", \"dateReserved\": \"2024-05-29T06:48:49.689Z\", \"assignerOrgId\": \"551230f0-3615-47bd-b7cc-93e92e730bbf\", \"datePublished\": \"2024-06-24T09:04:18.257Z\", \"assignerShortName\": \"SEC-VLab\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…