Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28143: CWE-620 Unverified Password Change in Image Access GmbH Scan2Net

0
High
VulnerabilityCVE-2024-28143cvecve-2024-28143cwe-620
Published: Thu Dec 12 2024 (12/12/2024, 13:52:35 UTC)
Source: CVE Database V5
Vendor/Project: Image Access GmbH
Product: Scan2Net

Description

The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter for a user without knowing the old password, e.g. by exploiting a CSRF issue.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:57:55 UTC

Technical Analysis

CVE-2024-28143 is a vulnerability classified under CWE-620 (Unverified Password Change) affecting Image Access GmbH's Scan2Net product. The core issue lies in the password change functionality located at /cgi/admin.cgi, which does not require the user to provide the current password before setting a new one. This design flaw enables an attacker to reset any user's password by manipulating the -rsetpass+-aaction+- parameter, potentially exploiting a Cross-Site Request Forgery (CSRF) vulnerability to perform the attack remotely without authentication or user interaction. The vulnerability compromises the confidentiality, integrity, and availability of the affected system by allowing unauthorized account takeover, which could lead to further malicious activities such as data exfiltration, configuration changes, or denial of service. The CVSS v3.1 base score of 8.4 reflects the high impact and low attack complexity, with the attack vector being local network access (AV:L), no privileges required (PR:N), and no user interaction (UI:N). Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a critical concern for organizations using Scan2Net devices, particularly in environments where secure document processing is essential.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of document scanning and imaging infrastructure. Unauthorized password resets can lead to account takeovers, enabling attackers to access sensitive scanned documents, alter device configurations, or disrupt scanning services. This can result in data breaches involving confidential information, loss of operational availability, and potential compliance violations under regulations such as GDPR. Organizations in sectors like government, healthcare, legal, and finance that rely heavily on secure document workflows are particularly vulnerable. The compromise of Scan2Net devices could also serve as a foothold for lateral movement within internal networks, increasing the overall risk exposure. The local network attack vector means that attackers need some level of network access, which could be achieved via compromised internal hosts or through social engineering attacks that place malicious actors within the network perimeter.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the Scan2Net administrative interface to trusted network segments and implementing network segmentation to limit exposure. Organizations should deploy Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) capable of detecting and blocking CSRF attempts and suspicious parameter manipulations targeting /cgi/admin.cgi. Administrators should monitor logs for unusual password reset activities and enforce strong network access controls, including VPNs and zero-trust principles for remote access. Since no official patch is currently available, organizations should engage with Image Access GmbH for updates and apply patches promptly once released. Additionally, implementing multi-factor authentication (MFA) on administrative accounts, if supported, can reduce the risk of unauthorized access. Security awareness training to recognize phishing and social engineering attempts that could facilitate network access is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2024-03-05T09:15:40.202Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092621fe7723195e0b46fa

Added to database: 11/3/2025, 10:01:05 PM

Last enriched: 11/3/2025, 11:57:55 PM

Last updated: 11/5/2025, 1:52:29 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats