Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24279: n/a

0
High
VulnerabilityCVE-2024-24279cvecve-2024-24279
Published: Mon Apr 08 2024 (04/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-24279 is a high-severity vulnerability in secdiskapp 1. 5. 1, the management software for NewQ Fingerprint Encryption Super Speed Flash Disk devices. The flaw allows attackers with limited privileges to escalate their access by exploiting weaknesses in the vsVerifyPassword and vsSetFingerPrintPower functions. This vulnerability impacts confidentiality, integrity, and availability, enabling full control over the device and potentially the host system. Exploitation requires local access but no user interaction, and the vulnerability has a CVSS score of 8. 8. No public exploits are currently known, and no patches have been released yet. Organizations using these devices risk unauthorized data access and manipulation. Mitigation involves restricting local access, monitoring for suspicious activity, and applying vendor patches once available.

AI-Powered Analysis

AILast updated: 02/26/2026, 10:22:33 UTC

Technical Analysis

CVE-2024-24279 identifies a critical vulnerability in secdiskapp version 1.5.1, the management application for NewQ Fingerprint Encryption Super Speed Flash Disk devices. The vulnerability arises from improper access control in the vsVerifyPassword and vsSetFingerPrintPower functions, which are responsible for verifying user credentials and managing fingerprint sensor power states, respectively. An attacker with limited privileges can exploit these functions to escalate their privileges, gaining unauthorized administrative control over the device. This escalation can lead to full compromise of the device's security features, including bypassing fingerprint authentication and accessing encrypted data stored on the flash disk. The vulnerability is classified under CWE-261 (Incorrect Control of Access to a Resource) and CWE-287 (Improper Authentication), indicating failures in enforcing proper authentication and authorization checks. The CVSS 3.1 base score of 8.8 reflects a high severity, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, impacting confidentiality, integrity, and availability (all rated high). No patches or public exploits are currently available, but the vulnerability poses a significant risk to any organization relying on these devices for secure data storage and authentication.

Potential Impact

The exploitation of CVE-2024-24279 can have severe consequences for organizations worldwide. Attackers gaining escalated privileges can bypass fingerprint authentication mechanisms, exposing sensitive encrypted data stored on the NewQ flash disks. This breach compromises confidentiality by allowing unauthorized data access, integrity by enabling data modification or deletion, and availability by potentially disabling the device or its security features. Organizations using these devices for secure authentication or data protection may face data breaches, intellectual property theft, or operational disruptions. The local access requirement limits remote exploitation but does not eliminate risk, especially in environments where multiple users share systems or where insider threats exist. The vulnerability could also be leveraged as a foothold for further lateral movement within networks, increasing the overall risk posture. The absence of patches heightens the urgency for interim mitigations to prevent exploitation.

Mitigation Recommendations

To mitigate the risks posed by CVE-2024-24279, organizations should implement the following specific measures: 1) Restrict physical and local access to systems using NewQ Fingerprint Encryption Super Speed Flash Disk devices to trusted personnel only, minimizing the attack surface. 2) Employ strict access control policies and monitor user activities on affected systems to detect any unauthorized attempts to escalate privileges or manipulate device functions. 3) Disable or limit the use of secdiskapp management software on systems where it is not essential, reducing exposure to the vulnerable functions. 4) Maintain up-to-date inventories of devices using NewQ flash disks to identify and prioritize vulnerable endpoints. 5) Engage with the vendor for timely updates and patches, and plan for rapid deployment once available. 6) Consider alternative secure storage solutions or multi-factor authentication methods to reduce reliance on vulnerable devices. 7) Conduct security awareness training to inform users about the risks of local privilege escalation and the importance of safeguarding physical access. These targeted actions go beyond generic advice by focusing on controlling local access and monitoring specific application usage patterns related to the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d58b7ef31ef0b5708ff

Added to database: 2/25/2026, 9:44:56 PM

Last enriched: 2/26/2026, 10:22:33 AM

Last updated: 2/26/2026, 11:12:10 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats