CVE-2024-53356
Published: 31 January 2025
Description
Adversaries may forge credential materials that can be used to gain access to web applications or Internet services.
Security Summary
CVE-2024-53356 is a weak JWT secret vulnerability affecting EasyVirt DCScope versions up to and including 8.6.0 and CO2Scope versions up to and including 1.3.0. The issue stems from a hardcoded HMAC secret, specifically "somerandomaccesstoken", used for generating JSON Web Tokens (JWTs). This predictable secret enables attackers to forge valid tokens, leading to privilege escalation within the application.
Remote attackers can exploit this vulnerability without authentication, as indicated by its CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By crafting JWTs with the known secret, unauthenticated adversaries gain unauthorized access to sensitive information and perform privileged actions, potentially compromising the full confidentiality, integrity, and availability of the affected systems.
Advisories detailing the vulnerability, including potential mitigation steps, are available in the referenced GitHub repository at https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2024-53356.md. The issue is classified under CWE-798 (Use of Hard-coded Credentials).
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Weak hardcoded JWT secret enables remote unauthenticated attackers to forge valid tokens for privilege escalation in a likely public-facing web application, facilitating exploitation of public-facing applications, exploitation for privilege escalation, and forging web credentials.