Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from "WebAPI.cfg.xml" in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 23 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Entrust Instant Financial Issuance
Entrust Instant Financial Issuance entrust Instant Financial Issuance
Weaknesses CWE-269
CPEs cpe:2.3:a:entrust_instant_financial_issuance:entrust_instant_financial_issuance:*:*:*:*:*:*:*:*
Vendors & Products Entrust Instant Financial Issuance
Entrust Instant Financial Issuance entrust Instant Financial Issuance
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Sep 2024 18:00:00 +0000

Type Values Removed Values Added
Description Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from "WebAPI.cfg.xml" in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-09-23T19:46:54.760Z

Reserved: 2024-06-24T00:00:00

Link: CVE-2024-39342

cve-icon Vulnrichment

Updated: 2024-09-23T19:39:34.558Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-23T18:15:05.570

Modified: 2024-09-26T13:32:55.343

Link: CVE-2024-39342

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.