Plaintext Credential Exposure in FOG Cloning and Management System
CVE-2024-41954
What is CVE-2024-41954?
The FOG Imaging System, a versatile tool for cloning, imaging, and inventory management, has a vulnerability that exposes plaintext service account credentials. These credentials are stored in the configuration file located at '/opt/fog/.fogsettings', which, by default, is accessible to all users on the host. This exposure can allow malicious users to exploit the credentials, leading to unauthorized account creation and potential manipulation of the web application. The vulnerability has been addressed in version 1.5.10.41, which enhances security by ensuring sensitive information is properly protected.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
References
CVSS V3.1
Timeline
Vulnerability published
