ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "not exploitable in the current implementation. Tokens are properly expired, invalidated, and bound to session context. Attempts to alter the token payload to extend its validity do not affect server-side validation."
Advisories
Source ID Title
EUVD EUVD EUVD-2020-16766 ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 14 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
Description ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse. ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "not exploitable in the current implementation. Tokens are properly expired, invalidated, and bound to session context. Attempts to alter the token payload to extend its validity do not affect server-side validation."

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-14T12:52:47.681Z

Reserved: 2020-08-13T00:00:00.000Z

Link: CVE-2020-24030

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-02T17:15:12.203

Modified: 2025-10-14T13:15:32.880

Link: CVE-2020-24030

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.