First published: Thu Oct 31 2024(Updated: )
A vulnerability was found in ESAFENET CDG 5. It has been rated as critical. Affected by this issue is the function delEntryptPolicySort of the file /com/esafenet/servlet/system/EncryptPolicyTypeService.java. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gemalto SafeNet CDG | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10596 has been rated as critical due to its potential for SQL injection.
CVE-2024-10596 occurs due to improper handling of the 'id' argument in the delEntryptPolicySort function in the EncryptPolicyTypeService.java file.
The potential impacts of CVE-2024-10596 include unauthorized access to sensitive data and manipulation of the database.
To fix CVE-2024-10596, ensure proper input validation and parameterized queries are implemented in the affected code.
CVE-2024-10596 affects Gemalto SafeNet CDG version 5.