Vulnerability Description
Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all Simple Care software installations. This issue affects Estomed Sp. z o.o. Simple Care software in all versions. The software is no longer supported.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Estomed | Simple Care | All versions |
Related Weaknesses (CWE)
References
- https://cert.pl/en/posts/2024/06/CVE-2024-1228/Third Party Advisory
- https://cert.pl/posts/2024/06/CVE-2024-1228/Third Party Advisory
- https://cert.pl/en/posts/2024/06/CVE-2024-1228/Third Party Advisory
- https://cert.pl/posts/2024/06/CVE-2024-1228/Third Party Advisory
FAQ
What is CVE-2024-3700?
CVE-2024-3700 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all Simple Care software installations. This ...
How severe is CVE-2024-3700?
CVE-2024-3700 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-3700?
Check the references section above for vendor advisories and patch information. Affected products include: Estomed Simple Care.