First published: Sat Oct 19 2024(Updated: )
A vulnerability was found in ESAFENET CDG 5. It has been classified as critical. This affects the function actionDelNetSecConfig of the file /com/esafenet/servlet/netSec/NetSecConfigService.java. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gemalto SafeNet CDG | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10135 has been classified as critical due to its potential for SQL injection.
To fix CVE-2024-10135, update to the latest version of ESAFENET CDG that includes patches addressing this vulnerability.
The impacts of CVE-2024-10135 include possible unauthorized access to the database through SQL injection via the affected functionality.
CVE-2024-10135 affects the file /com/esafenet/servlet/netSec/NetSecConfigService.java.
CVE-2024-10135 is a SQL injection vulnerability caused by improper handling of the argument id.