Vulnerability Description
Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from "WebAPI.cfg.xml" in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://gist.github.com/VAMorales/21a8700a67d80c263b38e693fd528313
- https://trustedcare.entrust.com/login
- https://www.entrust.com/
FAQ
What is CVE-2024-39342?
CVE-2024-39342 is a vulnerability with a CVSS score of 6.6 (MEDIUM). Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process tha...
How severe is CVE-2024-39342?
CVE-2024-39342 has been rated MEDIUM with a CVSS base score of 6.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-39342?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.