Cyber Posture

CVE-2024-42533

Critical

Published: 25 March 2025

Published
25 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0114 78.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2024-42533 is a SQL injection vulnerability (CWE-89) in the authentication module of Convivance StandVoice versions 4.5 through 6.2. The flaw allows remote attackers to execute arbitrary code by exploiting the GEST_LOGIN parameter. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low attack complexity, and lack of prerequisites.

Unauthenticated remote attackers can exploit this vulnerability over the network without user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, enabling arbitrary code execution on the affected system through the injected SQL payload in the authentication process.

Further details, including potential mitigation guidance, are documented in the referenced advisories at https://gist.github.com/7h30th3r0n3/eae27e0eed39741365c55dfd46b57dc8. Security practitioners should review these sources for patching instructions or workarounds specific to StandVoice deployments.

Details

CWE(s)
CWE-89

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection vulnerability in public-facing authentication module enables remote unauthenticated arbitrary code execution, directly mapping to T1190 Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References