CVE-2024-48125
Published: 15 January 2025
Summary
CVE-2024-48125 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Diva Portal (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 49.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AU-13 (Monitoring for Information Disclosure) and SC-7 (Boundary Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the flaw in the AsDB service that allows credential enumeration via crafted GIOP requests.
Enforces boundary protection to restrict unauthenticated network access to the vulnerable AsDB service.
Monitors the system for unauthorized disclosure of user credentials resulting from crafted GIOP requests to the AsDB service.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated credential disclosure via crafted requests to public-facing service directly enables T1190 exploitation and T1552 unsecured credential access.
NVD Description
An issue in the AsDB service of HI-SCAN 6040i Hitrax HX-03-19-I allows attackers to enumerate user credentials via crafted GIOP protocol requests.
Deeper analysisAI
CVE-2024-48125 is an information disclosure vulnerability (CWE-200) affecting the AsDB service in HI-SCAN 6040i Hitrax HX-03-19-I. The issue enables attackers to enumerate user credentials by sending crafted GIOP protocol requests to the service. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to significant confidentiality impact.
The vulnerability can be exploited by unauthenticated attackers with network access to the affected service, requiring low attack complexity and no user interaction. Successful exploitation allows remote extraction of sensitive user credentials, potentially enabling further unauthorized access or lateral movement within the target's environment.
Mitigation details are available in the referenced advisory at https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf, published alongside the CVE on 2025-01-15.
Details
- CWE(s)