CVE-2024-42533
Published: 25 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2024-42533 is a SQL injection vulnerability (CWE-89) in the authentication module of Convivance StandVoice versions 4.5 through 6.2. The flaw allows remote attackers to execute arbitrary code by exploiting the GEST_LOGIN parameter. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low attack complexity, and lack of prerequisites.
Unauthenticated remote attackers can exploit this vulnerability over the network without user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, enabling arbitrary code execution on the affected system through the injected SQL payload in the authentication process.
Further details, including potential mitigation guidance, are documented in the referenced advisories at https://gist.github.com/7h30th3r0n3/eae27e0eed39741365c55dfd46b57dc8. Security practitioners should review these sources for patching instructions or workarounds specific to StandVoice deployments.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
SQL injection vulnerability in public-facing authentication module enables remote unauthenticated arbitrary code execution, directly mapping to T1190 Exploit Public-Facing Application.