Cyber Posture

CVE-2024-57395

Critical

Published: 29 January 2025

Published
29 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0332 87.4th percentile
Risk Priority 22 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-57395 is a critical-severity Insufficiently Protected Credentials (CWE-522) vulnerability in Hzzcka (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 12.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 mandates secure management and protection of authenticators like passwords, directly countering CWE-522 insufficiently protected credentials exploited via password and account parameters.

prevent

SI-10 requires validation of information inputs, preventing remote exploitation of password and account number parameters for privilege escalation, RCE, and data exfiltration.

prevent

SI-2 ensures identification, reporting, and timely remediation of flaws like this critical password vulnerability in Safety production process management system v1.0.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Unauthenticated remote exploitation of public-facing app (CWE-522) directly enables T1190 for initial access and T1068 for resulting privilege escalation/RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Password Vulnerability in Safety production process management system v1.0 allows a remote attacker to escalate privileges, execute arbitrary code and obtain sensitive information via the password and account number parameters.

Deeper analysisAI

CVE-2024-57395 is a password vulnerability in the Safety production process management system version 1.0. The issue, tied to CWE-522 (Insufficiently Protected Credentials), enables a remote attacker to escalate privileges, execute arbitrary code, and obtain sensitive information by exploiting the password and account number parameters. Published on 2025-01-29, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its high impact on confidentiality, integrity, and availability.

A remote attacker requires only network access to exploit this vulnerability, with no privileges, user interaction, or special conditions needed owing to its low complexity. Exploitation allows full privilege escalation, remote code execution, and unauthorized access to sensitive data via manipulation of the specified parameters.

Advisories and additional details are available at http://www.hzzcka.com/ and https://github.com/qtxz54/Vul/blob/main/WeakPasswd/Safety-production-process-management-system.md.

Details

CWE(s)

Affected Products

Hzzcka
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-35155Shared CWE-522
CVE-2026-23658Shared CWE-522
CVE-2025-36568Shared CWE-522
CVE-2025-58130Shared CWE-522
CVE-2026-35467Shared CWE-522
CVE-2026-20791Shared CWE-522
CVE-2024-41770Shared CWE-522
CVE-2026-23958Shared CWE-522
CVE-2026-32171Shared CWE-522
CVE-2024-41771Shared CWE-522

References