Cyber Posture

CVE-2024-48125

High

Published: 15 January 2025

Published
15 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0028 51.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-48125 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Diva Portal (inferred from references). Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 49.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AU-13 (Monitoring for Information Disclosure) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the flaw in the AsDB service that allows credential enumeration via crafted GIOP requests.

prevent

Enforces boundary protection to restrict unauthenticated network access to the vulnerable AsDB service.

detect

Monitors the system for unauthorized disclosure of user credentials resulting from crafted GIOP requests to the AsDB service.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Remote unauthenticated credential disclosure via crafted requests to public-facing service directly enables T1190 exploitation and T1552 unsecured credential access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue in the AsDB service of HI-SCAN 6040i Hitrax HX-03-19-I allows attackers to enumerate user credentials via crafted GIOP protocol requests.

Deeper analysisAI

CVE-2024-48125 is an information disclosure vulnerability (CWE-200) affecting the AsDB service in HI-SCAN 6040i Hitrax HX-03-19-I. The issue enables attackers to enumerate user credentials by sending crafted GIOP protocol requests to the service. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to significant confidentiality impact.

The vulnerability can be exploited by unauthenticated attackers with network access to the affected service, requiring low attack complexity and no user interaction. Successful exploitation allows remote extraction of sensitive user credentials, potentially enabling further unauthorized access or lateral movement within the target's environment.

Mitigation details are available in the referenced advisory at https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf, published alongside the CVE on 2025-01-15.

Details

CWE(s)

Affected Products

Diva Portal
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-62188Shared CWE-200
CVE-2026-25146Shared CWE-200
CVE-2024-56902Shared CWE-200
CVE-2025-55190Shared CWE-200
CVE-2025-68438Shared CWE-200
CVE-2026-32609Shared CWE-200
CVE-2025-26001Shared CWE-200
CVE-2026-4020Shared CWE-200
CVE-2026-26069Shared CWE-200
CVE-2026-24870Shared CWE-200

References