Hard-coded Password Vulnerability in FileCatalyst TransferAgent Could Lead to MiTM Attacks
CVE-2024-5275
7.8HIGH
Key Information
- Vendor
- Fortra
- Status
- Filecatalyst Direct
- Filecatalyst Workflow
- Vendor
- CVE Published:
- 18 June 2024
Summary
A hard-coded password in the FileCatalyst TransferAgent can be found which can be used to unlock the keystore from which contents may be read out, for example, the private key for certificates. Exploit of this vulnerability could lead to a machine-in-the-middle (MiTM) attack against users of the agent. This issue affects all versions of FileCatalyst Direct from 3.8.10 Build 138 and earlier and all versions of FileCatalyst Workflow from 5.1.6 Build 130 and earlier.
Affected Version(s)
FileCatalyst Direct <= 3.8.10.138
FileCatalyst Workflow <= 5.1.6.130
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database
Credit
Greg at Palmer Research