First published: Fri Nov 01 2024(Updated: )
A vulnerability was found in ESAFENET CDG 5. It has been classified as critical. Affected is the function removeHookInvalidCourse of the file /com/esafenet/servlet/system/HookInvalidCourseService.java. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gemalto SafeNet CDG | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10612 has been classified as critical due to its potential impact and exploitation risk.
CVE-2024-10612 is a SQL injection vulnerability found in the removeHookInvalidCourse function of the ESAFENET CDG 5.
To fix CVE-2024-10612, ensure to sanitize and validate the input arguments for the removeHookInvalidCourse function to prevent SQL injection attacks.
CVE-2024-10612 affects ESAFENET CDG version 5.
Exploiting CVE-2024-10612 may allow an attacker to manipulate database queries, leading to unauthorized data access or modification.