Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from "WebAPI.cfg.xml" in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host.
History

Mon, 23 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Entrust Instant Financial Issuance
Entrust Instant Financial Issuance entrust Instant Financial Issuance
Weaknesses CWE-269
CPEs cpe:2.3:a:entrust_instant_financial_issuance:entrust_instant_financial_issuance:*:*:*:*:*:*:*:*
Vendors & Products Entrust Instant Financial Issuance
Entrust Instant Financial Issuance entrust Instant Financial Issuance
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Sep 2024 18:00:00 +0000

Type Values Removed Values Added
Description Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from "WebAPI.cfg.xml" in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-09-23T00:00:00

Updated: 2024-09-23T19:46:54.760Z

Reserved: 2024-06-24T00:00:00

Link: CVE-2024-39342

cve-icon Vulnrichment

Updated: 2024-09-23T19:39:34.558Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-23T18:15:05.570

Modified: 2024-09-26T13:32:55.343

Link: CVE-2024-39342

cve-icon Redhat

No data.