Cyber Posture

CVE-2024-53356

CriticalPublic PoC

Published: 31 January 2025

Published
31 January 2025
Modified
23 May 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0091 75.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may forge credential materials that can be used to gain access to web applications or Internet services.

Security Summary

CVE-2024-53356 is a weak JWT secret vulnerability affecting EasyVirt DCScope versions up to and including 8.6.0 and CO2Scope versions up to and including 1.3.0. The issue stems from a hardcoded HMAC secret, specifically "somerandomaccesstoken", used for generating JSON Web Tokens (JWTs). This predictable secret enables attackers to forge valid tokens, leading to privilege escalation within the application.

Remote attackers can exploit this vulnerability without authentication, as indicated by its CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By crafting JWTs with the known secret, unauthenticated adversaries gain unauthorized access to sensitive information and perform privileged actions, potentially compromising the full confidentiality, integrity, and availability of the affected systems.

Advisories detailing the vulnerability, including potential mitigation steps, are available in the referenced GitHub repository at https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2024-53356.md. The issue is classified under CWE-798 (Use of Hard-coded Credentials).

Details

CWE(s)
CWE-798

Affected Products

easyvirt
co2scope
≤ 1.3.0
easyvirt
dcscope
≤ 8.6.0

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1606 Forge Web Credentials Credential Access
Adversaries may forge credential materials that can be used to gain access to web applications or Internet services.
Why these techniques?

Weak hardcoded JWT secret enables remote unauthenticated attackers to forge valid tokens for privilege escalation in a likely public-facing web application, facilitating exploitation of public-facing applications, exploitation for privilege escalation, and forging web credentials.

References