Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1662: CWE-306 Missing Authentication for Critical Function in PORTY Smart Tech Technology Joint Stock Company PowerBank Application

0
High
VulnerabilityCVE-2024-1662cvecve-2024-1662cwe-306cwe-862
Published: Wed Jun 05 2024 (06/05/2024, 11:51:51 UTC)
Source: CVE Database V5
Vendor/Project: PORTY Smart Tech Technology Joint Stock Company
Product: PowerBank Application

Description

Missing Authentication for Critical Function, Missing Authorization vulnerability in PORTY Smart Tech Technology Joint Stock Company PowerBank Application allows Retrieve Embedded Sensitive Data.This issue affects PowerBank Application: before 2.02.

AI-Powered Analysis

AILast updated: 10/14/2025, 13:10:51 UTC

Technical Analysis

CVE-2024-1662 is a vulnerability identified in the PowerBank Application developed by PORTY Smart Tech Technology Joint Stock Company, affecting versions prior to 2.02. The core issue is the absence of authentication and authorization mechanisms on critical functions within the application, classified under CWE-306 (Missing Authentication for Critical Function) and CWE-862 (Missing Authorization). This flaw allows an attacker to remotely access and retrieve embedded sensitive data from the application without needing any privileges or user interaction. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit. The impact primarily affects confidentiality (C:H), with no direct impact on integrity or availability. Although no public exploits are currently known, the vulnerability poses a significant risk due to the sensitive nature of the data accessible and the lack of protective controls. The PowerBank Application is likely used to manage or interface with power bank devices, potentially storing sensitive configuration or user data embedded within the application. The absence of authentication and authorization controls means that any attacker with network access to the application can retrieve this data, potentially leading to information disclosure or further targeted attacks. The vulnerability was reserved in February 2024 and published in June 2024, indicating recent discovery and disclosure. No patches are currently linked, suggesting that users should be vigilant for updates from the vendor. Given the CVSS vector and score of 7.5, this vulnerability is classified as high severity, emphasizing the need for immediate mitigation steps.

Potential Impact

For European organizations, the primary impact of CVE-2024-1662 is the unauthorized disclosure of embedded sensitive data within the PowerBank Application. This could lead to leakage of confidential corporate or personal information, potentially violating data protection regulations such as GDPR. Organizations relying on the PowerBank Application for managing power bank devices or related infrastructure may face increased risk of espionage, data theft, or subsequent attacks leveraging the exposed information. The vulnerability's ease of exploitation without authentication or user interaction increases the attack surface, especially for organizations with network-exposed instances of the application. This could affect sectors such as manufacturing, logistics, or IT services that utilize PORTY Smart Tech products. The lack of integrity or availability impact means the threat is primarily data confidentiality compromise rather than service disruption. However, the reputational damage and compliance risks associated with data breaches are significant. European organizations must consider the potential for targeted attacks exploiting this vulnerability, especially in countries with high adoption of the affected product or strategic interest in the technology sector.

Mitigation Recommendations

1. Monitor vendor communications closely for official patches or updates addressing CVE-2024-1662 and apply them promptly once available. 2. Until patches are released, restrict network access to the PowerBank Application using firewalls or network segmentation to limit exposure to trusted internal users only. 3. Implement strict access control policies and network-level authentication mechanisms to prevent unauthorized external access. 4. Conduct thorough audits of systems running the PowerBank Application to identify any unauthorized access or data exfiltration attempts. 5. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous network traffic targeting the application. 6. Review and harden configurations of the PowerBank Application to disable any unnecessary services or interfaces that could be exploited. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response to potential exploitation attempts. 8. Consider isolating or removing the affected application from critical network segments until a secure version is deployed. 9. Maintain comprehensive logging and monitoring to support forensic investigations if a breach is suspected. 10. Engage with PORTY Smart Tech support to obtain guidance and timelines for remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TR-CERT
Date Reserved
2024-02-20T13:04:36.144Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee47d1509368ccaa6fd054

Added to database: 10/14/2025, 12:53:37 PM

Last enriched: 10/14/2025, 1:10:51 PM

Last updated: 10/16/2025, 2:38:43 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats