Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12146: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Finder Fire Safety Finder ERP/CRM (New System)

0
High
VulnerabilityCVE-2024-12146cvecve-2024-12146cwe-89
Published: Thu Mar 06 2025 (03/06/2025, 14:08:33 UTC)
Source: CVE Database V5
Vendor/Project: Finder Fire Safety
Product: Finder ERP/CRM (New System)

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Finder Fire Safety Finder ERP/CRM (New System) allows SQL Injection.This issue affects Finder ERP/CRM (New System): before 18.12.2024.

AI-Powered Analysis

AILast updated: 10/14/2025, 13:02:24 UTC

Technical Analysis

CVE-2024-12146 is a SQL Injection vulnerability classified under CWE-89, found in the Finder Fire Safety Finder ERP/CRM (New System) product versions before 18.12.2024. The vulnerability arises from improper neutralization of special characters in SQL commands, allowing attackers to inject arbitrary SQL code. This flaw can be exploited remotely over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation compromises the confidentiality of the backend database by enabling unauthorized data extraction, but does not affect data integrity or system availability. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its high severity. No public exploits have been reported yet, but the ease of exploitation and potential impact make it a critical concern. The ERP/CRM system is likely used to manage sensitive business and operational data related to fire safety services, making the exposure of such data particularly damaging. The lack of available patches at the time of reporting necessitates immediate mitigation efforts by affected organizations. The vulnerability underscores the importance of secure coding practices such as input validation and the use of parameterized queries to prevent SQL Injection attacks.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive business, client, and operational data managed within the Finder ERP/CRM system. This could result in loss of competitive advantage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and reputational damage. Fire safety companies and related sectors relying on this ERP/CRM may face operational disruptions if sensitive data is exposed or leveraged for further attacks. The confidentiality breach could also expose personal data of European citizens, triggering legal and financial consequences under European data protection laws. Given the remote and unauthenticated nature of the exploit, attackers can easily target exposed systems, increasing the risk of widespread compromise. The absence of known exploits currently provides a window for proactive defense, but the high severity score indicates that the threat should be treated with urgency.

Mitigation Recommendations

1. Apply vendor patches immediately once they become available for versions prior to 18.12.2024. 2. Until patches are released, restrict external network access to the ERP/CRM system using firewalls and VPNs to limit exposure. 3. Implement Web Application Firewalls (WAFs) with rules designed to detect and block SQL Injection attempts targeting the ERP/CRM endpoints. 4. Conduct thorough input validation and sanitize all user-supplied data in the application code, employing parameterized queries or prepared statements to prevent injection. 5. Perform regular security assessments and code reviews focusing on SQL query construction and input handling. 6. Monitor logs for unusual database query patterns or repeated failed attempts indicative of injection attacks. 7. Educate development and IT teams on secure coding practices and the risks of SQL Injection. 8. Consider network segmentation to isolate the ERP/CRM system from other critical infrastructure to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TR-CERT
Date Reserved
2024-12-04T11:44:09.224Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee4921509368ccaa72489e

Added to database: 10/14/2025, 12:59:13 PM

Last enriched: 10/14/2025, 1:02:24 PM

Last updated: 10/16/2025, 12:42:06 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats