CVE-2024-0770: CWE-276 Incorrect Default Permissions in European Chemicals Agency IUCLID
A vulnerability, which was classified as critical, was found in European Chemicals Agency IUCLID 7.10.3 on Windows. Affected is an unknown function of the file iuclid6.exe of the component Desktop Installer. The manipulation leads to incorrect default permissions. The attack needs to be approached locally. VDB-251670 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0770 is a vulnerability identified in version 7.10.3 of the European Chemicals Agency's IUCLID software, specifically affecting the Windows executable iuclid6.exe within the Desktop Installer component. The vulnerability is classified under CWE-276, which pertains to incorrect default permissions. This means that certain files, directories, or resources within the IUCLID installation are assigned permissions that are too permissive by default, potentially allowing unauthorized local users to modify or interfere with the application or its data. The attack vector requires local access with at least limited privileges (PR:L), and no user interaction is necessary (UI:N). The vulnerability impacts the integrity and availability of the system, as unauthorized modifications could lead to altered application behavior or denial of service. The CVSS v3.1 base score is 4.4, indicating a medium severity level, with the vector string AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L. This score reflects that exploitation requires local access and low attack complexity, with no impact on confidentiality but partial impact on integrity and availability. The vendor was contacted early but did not respond, and no patches or known exploits in the wild have been reported at the time of disclosure. IUCLID is a critical tool used by chemical regulatory agencies and industry stakeholders for data management related to chemical substances, making the integrity of its installation important for regulatory compliance and safety data accuracy.
Potential Impact
For European organizations, particularly those involved in chemical regulation, manufacturing, or compliance reporting, this vulnerability poses a risk to the integrity and availability of critical chemical data managed through IUCLID. Unauthorized local users with limited privileges could exploit the incorrect default permissions to modify installation files or configurations, potentially leading to corrupted data, altered chemical substance information, or disruption of regulatory submissions. This could result in compliance failures, regulatory penalties, or safety risks if inaccurate chemical data is propagated. Since IUCLID is widely used across European chemical agencies and companies to comply with EU regulations such as REACH, the impact could affect operational continuity and trustworthiness of chemical data management processes. However, the requirement for local access limits the threat to insiders or attackers who have already compromised a local account, reducing the risk of remote exploitation.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Restrict local access to systems running IUCLID to trusted and authorized personnel only, enforcing strict user account controls and monitoring. 2) Review and manually audit the file and directory permissions of the IUCLID installation, correcting any overly permissive settings to adhere to the principle of least privilege. 3) Implement application whitelisting and integrity monitoring tools to detect unauthorized changes to IUCLID executables and configuration files. 4) Employ endpoint protection solutions that can detect and prevent privilege escalation attempts or unauthorized local modifications. 5) Maintain strict physical security controls on machines running IUCLID to prevent unauthorized local access. 6) Engage with the European Chemicals Agency or IUCLID maintainers for updates or patches, and apply them promptly once available. 7) Consider isolating IUCLID installations in controlled environments or virtual machines to limit exposure. These steps go beyond generic advice by focusing on local access control, permission auditing, and integrity monitoring specific to the IUCLID environment.
Affected Countries
Germany, France, Italy, Netherlands, Belgium, Sweden, Finland, Denmark, Poland, Spain
CVE-2024-0770: CWE-276 Incorrect Default Permissions in European Chemicals Agency IUCLID
Description
A vulnerability, which was classified as critical, was found in European Chemicals Agency IUCLID 7.10.3 on Windows. Affected is an unknown function of the file iuclid6.exe of the component Desktop Installer. The manipulation leads to incorrect default permissions. The attack needs to be approached locally. VDB-251670 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0770 is a vulnerability identified in version 7.10.3 of the European Chemicals Agency's IUCLID software, specifically affecting the Windows executable iuclid6.exe within the Desktop Installer component. The vulnerability is classified under CWE-276, which pertains to incorrect default permissions. This means that certain files, directories, or resources within the IUCLID installation are assigned permissions that are too permissive by default, potentially allowing unauthorized local users to modify or interfere with the application or its data. The attack vector requires local access with at least limited privileges (PR:L), and no user interaction is necessary (UI:N). The vulnerability impacts the integrity and availability of the system, as unauthorized modifications could lead to altered application behavior or denial of service. The CVSS v3.1 base score is 4.4, indicating a medium severity level, with the vector string AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L. This score reflects that exploitation requires local access and low attack complexity, with no impact on confidentiality but partial impact on integrity and availability. The vendor was contacted early but did not respond, and no patches or known exploits in the wild have been reported at the time of disclosure. IUCLID is a critical tool used by chemical regulatory agencies and industry stakeholders for data management related to chemical substances, making the integrity of its installation important for regulatory compliance and safety data accuracy.
Potential Impact
For European organizations, particularly those involved in chemical regulation, manufacturing, or compliance reporting, this vulnerability poses a risk to the integrity and availability of critical chemical data managed through IUCLID. Unauthorized local users with limited privileges could exploit the incorrect default permissions to modify installation files or configurations, potentially leading to corrupted data, altered chemical substance information, or disruption of regulatory submissions. This could result in compliance failures, regulatory penalties, or safety risks if inaccurate chemical data is propagated. Since IUCLID is widely used across European chemical agencies and companies to comply with EU regulations such as REACH, the impact could affect operational continuity and trustworthiness of chemical data management processes. However, the requirement for local access limits the threat to insiders or attackers who have already compromised a local account, reducing the risk of remote exploitation.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Restrict local access to systems running IUCLID to trusted and authorized personnel only, enforcing strict user account controls and monitoring. 2) Review and manually audit the file and directory permissions of the IUCLID installation, correcting any overly permissive settings to adhere to the principle of least privilege. 3) Implement application whitelisting and integrity monitoring tools to detect unauthorized changes to IUCLID executables and configuration files. 4) Employ endpoint protection solutions that can detect and prevent privilege escalation attempts or unauthorized local modifications. 5) Maintain strict physical security controls on machines running IUCLID to prevent unauthorized local access. 6) Engage with the European Chemicals Agency or IUCLID maintainers for updates or patches, and apply them promptly once available. 7) Consider isolating IUCLID installations in controlled environments or virtual machines to limit exposure. These steps go beyond generic advice by focusing on local access control, permission auditing, and integrity monitoring specific to the IUCLID environment.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-21T09:07:24.291Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839c41d182aa0cae2b435bb
Added to database: 5/30/2025, 2:43:41 PM
Last enriched: 7/8/2025, 4:43:57 PM
Last updated: 12/1/2025, 7:14:56 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13811: SQL Injection in jsnjfz WebStack-Guns
MediumCVE-2025-13810: Path Traversal in jsnjfz WebStack-Guns
MediumCVE-2025-13809: Server-Side Request Forgery in orionsec orion-ops
MediumCVE-2025-13808: Improper Authorization in orionsec orion-ops
MediumCVE-2025-13807: Improper Authorization in orionsec orion-ops
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.