Hard-coded Password Vulnerability in FileCatalyst TransferAgent Could Lead to MiTM Attacks

CVE-2024-5275
7.8HIGH

Key Information

Vendor
Fortra
Status
Filecatalyst Direct
Filecatalyst Workflow
Vendor
CVE Published:
18 June 2024

Summary

A hard-coded password in the FileCatalyst TransferAgent can be found which can be used to unlock the keystore from which contents may be read out, for example, the private key for certificates. Exploit of this vulnerability could lead to a machine-in-the-middle (MiTM) attack against users of the agent. This issue affects all versions of FileCatalyst Direct from 3.8.10 Build 138 and earlier and all versions of FileCatalyst Workflow from 5.1.6 Build 130 and earlier.

Affected Version(s)

FileCatalyst Direct <= 3.8.10.138

FileCatalyst Workflow <= 5.1.6.130

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database

Credit

Greg at Palmer Research
.