First published: Fri Nov 01 2024(Updated: )
A vulnerability has been found in ESAFENET CDG 5 and classified as critical. This vulnerability affects the function delProtocol of the file /com/esafenet/servlet/system/ProtocolService.java. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gemalto SafeNet CDG | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10610 is classified as a critical vulnerability.
The CVE-2024-10610 exploit works by manipulating the 'id' argument in the delProtocol function, leading to SQL injection.
CVE-2024-10610 affects ESAFENET CDG version 5.
Mitigation for CVE-2024-10610 involves validating and sanitizing all input parameters in the affected ProtocolService.java file.
The impact of CVE-2024-10610 can include unauthorized access to sensitive data through SQL injection.