CVE-2024-57395
Published: 29 January 2025
Summary
CVE-2024-57395 is a critical-severity Insufficiently Protected Credentials (CWE-522) vulnerability in Hzzcka (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 12.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
IA-5 mandates secure management and protection of authenticators like passwords, directly countering CWE-522 insufficiently protected credentials exploited via password and account parameters.
SI-10 requires validation of information inputs, preventing remote exploitation of password and account number parameters for privilege escalation, RCE, and data exfiltration.
SI-2 ensures identification, reporting, and timely remediation of flaws like this critical password vulnerability in Safety production process management system v1.0.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote exploitation of public-facing app (CWE-522) directly enables T1190 for initial access and T1068 for resulting privilege escalation/RCE.
NVD Description
Password Vulnerability in Safety production process management system v1.0 allows a remote attacker to escalate privileges, execute arbitrary code and obtain sensitive information via the password and account number parameters.
Deeper analysisAI
CVE-2024-57395 is a password vulnerability in the Safety production process management system version 1.0. The issue, tied to CWE-522 (Insufficiently Protected Credentials), enables a remote attacker to escalate privileges, execute arbitrary code, and obtain sensitive information by exploiting the password and account number parameters. Published on 2025-01-29, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its high impact on confidentiality, integrity, and availability.
A remote attacker requires only network access to exploit this vulnerability, with no privileges, user interaction, or special conditions needed owing to its low complexity. Exploitation allows full privilege escalation, remote code execution, and unauthorized access to sensitive data via manipulation of the specified parameters.
Advisories and additional details are available at http://www.hzzcka.com/ and https://github.com/qtxz54/Vul/blob/main/WeakPasswd/Safety-production-process-management-system.md.
Details
- CWE(s)