Remote SQL Injection Vulnerability in Netentsec NS-ASG Application Security Gateway
CVE-2024-5773

9.8CRITICAL

Key Information:

Vendor

Netentsec

Vendor
CVE Published:
9 June 2024

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2024-5773?

A significant vulnerability has been identified in Netentsec's NS-ASG Application Security Gateway version 6.3. This flaw is located within an unspecified function of the 'deletemacbind.php' file, which can be exploited to execute SQL injection attacks. Attackers may manipulate the 'messagecontent' argument, thereby allowing them to interact with the underlying database remotely. Given the public disclosure of this exploit, immediate remediation steps should be taken to protect sensitive data and maintain the integrity of the affected systems. Despite attempts to contact Netentsec regarding this issue, no response has been received from the vendor. Monitoring for indicators of compromise is highly recommended.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

NS-ASG Application Security Gateway 6.3

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

N3xu5Cr4ck37 (VulDB User)
.