CVE-2024-23770: n/a in n/a
darkhttpd through 1.15 allows local users to discover credentials (for --auth) by listing processes and their arguments.
AI Analysis
Technical Summary
CVE-2024-23770 is a medium-severity vulnerability affecting darkhttpd, a lightweight HTTP server, through version 1.15. The vulnerability arises because darkhttpd allows local users to discover credentials used for HTTP authentication (the --auth option) by inspecting the process list and their command-line arguments. Specifically, when darkhttpd is started with authentication enabled, the credentials are passed as command-line parameters, which are visible to any local user who can list processes (e.g., via commands like ps or similar). This exposure leads to a confidentiality breach as sensitive authentication credentials can be easily obtained without requiring elevated privileges beyond local user access. The vulnerability does not affect the integrity or availability of the server, nor does it require user interaction. The CVSS 3.1 base score is 5.5, reflecting a medium severity with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning local attack vector, low attack complexity, requires low privileges, no user interaction, unchanged scope, and high confidentiality impact but no impact on integrity or availability. There are no known exploits in the wild at this time, and no patches or vendor advisories have been linked yet. The vulnerability primarily concerns environments where darkhttpd is used with authentication enabled and where multiple local users have access to the system, potentially exposing credentials to unauthorized local users.
Potential Impact
For European organizations, the impact of CVE-2024-23770 depends largely on the deployment context of darkhttpd. Organizations using darkhttpd in multi-user environments, such as shared servers or development machines, risk unauthorized disclosure of authentication credentials to local users. This can lead to unauthorized access to web services protected by these credentials, potentially exposing sensitive internal resources or data. While the vulnerability does not allow remote exploitation, insider threats or compromised local accounts could leverage this to escalate access. In sectors with strict data protection regulations like GDPR, unauthorized credential disclosure could lead to compliance issues and reputational damage. The impact is more pronounced in organizations with less stringent local user access controls or where darkhttpd is used in production environments with authentication enabled. However, organizations that deploy darkhttpd on isolated or single-user systems face minimal risk. Overall, the confidentiality breach could facilitate lateral movement or privilege escalation within affected networks, increasing the risk of further compromise.
Mitigation Recommendations
To mitigate CVE-2024-23770, European organizations should avoid passing authentication credentials via command-line arguments when running darkhttpd. Instead, credentials should be stored and referenced securely, for example, by using configuration files with strict permissions or environment variables inaccessible to other users. If possible, run darkhttpd under dedicated service accounts with minimal privileges and restrict local user access to the system to trusted personnel only. Employ process hiding or restrict access to process listing commands (e.g., limit use of ps, top, or /proc filesystem permissions) to prevent unauthorized users from viewing process arguments. Additionally, consider using alternative HTTP servers that do not expose credentials in process arguments or that support more secure authentication mechanisms. Regularly audit systems for unauthorized access and monitor for suspicious local user activity. Finally, keep track of vendor updates or patches addressing this vulnerability and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2024-23770: n/a in n/a
Description
darkhttpd through 1.15 allows local users to discover credentials (for --auth) by listing processes and their arguments.
AI-Powered Analysis
Technical Analysis
CVE-2024-23770 is a medium-severity vulnerability affecting darkhttpd, a lightweight HTTP server, through version 1.15. The vulnerability arises because darkhttpd allows local users to discover credentials used for HTTP authentication (the --auth option) by inspecting the process list and their command-line arguments. Specifically, when darkhttpd is started with authentication enabled, the credentials are passed as command-line parameters, which are visible to any local user who can list processes (e.g., via commands like ps or similar). This exposure leads to a confidentiality breach as sensitive authentication credentials can be easily obtained without requiring elevated privileges beyond local user access. The vulnerability does not affect the integrity or availability of the server, nor does it require user interaction. The CVSS 3.1 base score is 5.5, reflecting a medium severity with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning local attack vector, low attack complexity, requires low privileges, no user interaction, unchanged scope, and high confidentiality impact but no impact on integrity or availability. There are no known exploits in the wild at this time, and no patches or vendor advisories have been linked yet. The vulnerability primarily concerns environments where darkhttpd is used with authentication enabled and where multiple local users have access to the system, potentially exposing credentials to unauthorized local users.
Potential Impact
For European organizations, the impact of CVE-2024-23770 depends largely on the deployment context of darkhttpd. Organizations using darkhttpd in multi-user environments, such as shared servers or development machines, risk unauthorized disclosure of authentication credentials to local users. This can lead to unauthorized access to web services protected by these credentials, potentially exposing sensitive internal resources or data. While the vulnerability does not allow remote exploitation, insider threats or compromised local accounts could leverage this to escalate access. In sectors with strict data protection regulations like GDPR, unauthorized credential disclosure could lead to compliance issues and reputational damage. The impact is more pronounced in organizations with less stringent local user access controls or where darkhttpd is used in production environments with authentication enabled. However, organizations that deploy darkhttpd on isolated or single-user systems face minimal risk. Overall, the confidentiality breach could facilitate lateral movement or privilege escalation within affected networks, increasing the risk of further compromise.
Mitigation Recommendations
To mitigate CVE-2024-23770, European organizations should avoid passing authentication credentials via command-line arguments when running darkhttpd. Instead, credentials should be stored and referenced securely, for example, by using configuration files with strict permissions or environment variables inaccessible to other users. If possible, run darkhttpd under dedicated service accounts with minimal privileges and restrict local user access to the system to trusted personnel only. Employ process hiding or restrict access to process listing commands (e.g., limit use of ps, top, or /proc filesystem permissions) to prevent unauthorized users from viewing process arguments. Additionally, consider using alternative HTTP servers that do not expose credentials in process arguments or that support more secure authentication mechanisms. Regularly audit systems for unauthorized access and monitor for suspicious local user activity. Finally, keep track of vendor updates or patches addressing this vulnerability and apply them promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-01-22T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839c41d182aa0cae2b4361e
Added to database: 5/30/2025, 2:43:41 PM
Last enriched: 7/8/2025, 7:13:58 PM
Last updated: 8/15/2025, 8:37:55 PM
Views: 13
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.