Encrypted Configuration File Vulnerable to Decryption
CVE-2024-36496
What is CVE-2024-36496?
Faronics WinSelect's configuration file is compromised due to its encryption method, which employs a static key derived from a weak five-character password. This password is hashed using the obsolete MD5 algorithm without a salt, exposing it to decryption risks. Furthermore, the first five bytes of this hash serve as the key for RC4 encryption, which is also known for its vulnerabilities. Attackers can potentially exploit this flaw to gain unauthorized access to sensitive configurations.
Affected Version(s)
WINSelect (Standard + Enterprise) 8.30.xx.903
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved