First published: Wed Oct 23 2024(Updated: )
A vulnerability was found in ESAFENET CDG 5. It has been classified as critical. This affects an unknown part of the file /com/esafenet/servlet/user/ReUserOrganiseService.java. The manipulation of the argument userId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gemalto SafeNet CDG | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-10278 is classified as critical.
CVE-2024-10278 affects ESAFENET CDG 5 by allowing SQL injection through the manipulation of the userId argument.
Yes, CVE-2024-10278 can be exploited remotely.
CVE-2024-10278 affects the file /com/esafenet/servlet/user/ReUserOrganiseService.java.
To fix CVE-2024-10278, users should implement input validation to prevent SQL injection in the affected service.