Encrypted Configuration File Vulnerable to Decryption
CVE-2024-36496
Key Information:
- Vendor
Faronics
- Vendor
- CVE Published:
- 24 June 2024
Badges
What is CVE-2024-36496?
Faronics WinSelect's configuration file is compromised due to its encryption method, which employs a static key derived from a weak five-character password. This password is hashed using the obsolete MD5 algorithm without a salt, exposing it to decryption risks. Furthermore, the first five bytes of this hash serve as the key for RC4 encryption, which is also known for its vulnerabilities. Attackers can potentially exploit this flaw to gain unauthorized access to sensitive configurations.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
WINSelect (Standard + Enterprise) 8.30.xx.903
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
