Skip to main content

CVE-2024-23589: CWE-328 Use of Weak Hash in HCL Software HCL Glovius Cloud

Medium
VulnerabilityCVE-2024-23589cvecve-2024-23589cwe-328
Published: Fri May 30 2025 (05/30/2025, 15:36:13 UTC)
Source: CVE Database V5
Vendor/Project: HCL Software
Product: HCL Glovius Cloud

Description

Due to outdated Hash algorithm, HCL Glovius Cloud could allow attackers to guess the input data using brute-force or dictionary attacks efficiently using modern hardware such as GPUs or ASICs

AI-Powered Analysis

AILast updated: 07/08/2025, 16:11:33 UTC

Technical Analysis

CVE-2024-23589 identifies a vulnerability in HCL Glovius Cloud, a product by HCL Software, stemming from the use of a weak, outdated hash algorithm. The weakness lies in the cryptographic hash function employed by the software to protect certain input data. Due to the hash algorithm's insufficient resistance to brute-force or dictionary attacks, attackers equipped with modern computational hardware such as GPUs or ASICs can efficiently guess or recover the original input data. This vulnerability is classified under CWE-328, which concerns the use of weak cryptographic primitives. The CVSS 3.1 base score is 6.8, indicating a medium severity level, with vector metrics showing that the attack requires adjacent network access (AV:A), high attack complexity (AC:H), low privileges (PR:L), and user interaction (UI:R). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), and the scope is unchanged (S:U). The affected version is 240520 of HCL Glovius Cloud. No known exploits are currently reported in the wild, and no patch links are provided at this time. The vulnerability's root cause is the reliance on an outdated hash function that modern hardware can break efficiently, potentially exposing sensitive data or allowing data tampering and denial of service through compromised integrity and availability.

Potential Impact

For European organizations using HCL Glovius Cloud, this vulnerability poses a significant risk to the confidentiality and integrity of their data processed or stored within the platform. Given the medium CVSS score but high impact on confidentiality, integrity, and availability, attackers could leverage this weakness to recover sensitive input data, potentially including intellectual property, design files, or user credentials. This could lead to data breaches, intellectual property theft, or disruption of services relying on the cloud platform. The requirement for adjacent network access and user interaction somewhat limits the attack surface but does not eliminate risk, especially in collaborative environments or where insider threats exist. European organizations in sectors such as manufacturing, engineering, or design that rely on HCL Glovius Cloud for CAD or product lifecycle management could face operational disruptions and compliance issues under GDPR if personal or sensitive data is exposed. The absence of known exploits suggests the threat is currently theoretical but should be treated proactively to prevent future exploitation.

Mitigation Recommendations

Organizations should prioritize upgrading to a version of HCL Glovius Cloud that replaces the weak hash algorithm with a modern, cryptographically secure hash function such as SHA-256 or better. Until a patch is available, mitigating controls include restricting access to the affected systems to trusted networks only, implementing strict network segmentation to limit adjacent network access, and enforcing strong user authentication and authorization policies to reduce the risk of low-privilege attackers exploiting the vulnerability. Monitoring and logging user interactions and network traffic can help detect suspicious activities indicative of exploitation attempts. Additionally, organizations should conduct regular security assessments and penetration testing focused on cryptographic implementations within their environments. Engaging with HCL Software for timely updates and security advisories is critical. Finally, educating users about the risks of social engineering and the importance of cautious interaction with the platform can reduce the likelihood of successful user-interaction-dependent attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
HCL
Date Reserved
2024-01-18T07:30:10.662Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839d221182aa0cae2b630f6

Added to database: 5/30/2025, 3:43:29 PM

Last enriched: 7/8/2025, 4:11:33 PM

Last updated: 8/16/2025, 3:38:42 PM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats