CVE Alert: CVE-2024-39342
Vulnerability Summary: CVE-2024-39342
Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from “WebAPI.cfg.xml” in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host.
Affected Endpoints:
No affected endpoints listed.
Published Date:
9/23/2024, 6:15:05 PM
⚠️ CVSS Score:
Exploit Status:
Not ExploitedReferences:
- https://gist.github.com/VAMorales/21a8700a67d80c263b38e693fd528313
- https://trustedcare.entrust.com/login
- https://www.entrust.com/
Recommended Action:
No proposed action available. Please refer to vendor documentation for updates.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.