Cyber Posture

CVE-2024-42172

Medium

Published: 11 January 2025

Published
11 January 2025
Modified
16 May 2025
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Score 0.0020 41.8th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-42172 is a medium-severity Improper Authentication (CWE-287) vulnerability in Hcltech Dryice Myxalytics. Its CVSS base score is 5.3 (Medium).

Operationally, ranked at the 41.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly manages and protects authenticators including keys, passwords, and session tokens to prevent compromise from broken authentication vulnerabilities.

prevent

Requires timely remediation of software flaws, logic errors, and bugs that enable the broken authentication exploitation.

prevent

Enforces secure configuration settings to address poor configurations causing improper authentication and credential exposure.

NVD Description

HCL MyXalytics is affected by broken authentication. It allows attackers to compromise keys, passwords, and session tokens, potentially leading to identity theft and system control. This vulnerability arises from poor configuration, logic errors, or software bugs and can affect any…

more

application with access control, including databases, network infrastructure, and web applications.

Deeper analysisAI

CVE-2024-42172 is a broken authentication vulnerability affecting HCL MyXalytics. It stems from poor configuration, logic errors, or software bugs that enable attackers to compromise keys, passwords, and session tokens. The issue is classified under CWE-287 (Improper Authentication) and CWE-522 (Insufficiently Protected Credentials), with a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), indicating medium severity primarily due to low-impact confidentiality disclosure over the network without privileges.

Unauthenticated attackers (PR:N) can exploit this vulnerability remotely (AV:N) with low complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows compromise of authentication credentials, potentially leading to identity theft and full system control. The vulnerability impacts any applications with access control mechanisms integrated via HCL MyXalytics, such as databases, network infrastructure, and web applications.

HCL has issued a knowledge base article detailing mitigation: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118149. Security practitioners should consult this advisory for specific patches, configuration guidance, or workarounds to address the broken authentication.

Details

CWE(s)

Affected Products

hcltech
dryice myxalytics
6.3

CVEs Like This One

CVE-2024-42176Same product: Hcltech Dryice Myxalytics
CVE-2024-42180Same product: Hcltech Dryice Myxalytics
CVE-2024-42175Same product: Hcltech Dryice Myxalytics
CVE-2024-42169Same product: Hcltech Dryice Myxalytics
CVE-2024-42168Same product: Hcltech Dryice Myxalytics
CVE-2024-42181Same product: Hcltech Dryice Myxalytics
CVE-2025-52631Same vendor: Hcltech
CVE-2025-52626Same vendor: Hcltech
CVE-2025-55270Same vendor: Hcltech
CVE-2025-55261Same vendor: Hcltech

References