Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28146: CWE-798 Use of Hard-coded Credentials in Image Access GmbH Scan2Net

0
High
VulnerabilityCVE-2024-28146cvecve-2024-28146cwe-798
Published: Thu Dec 12 2024 (12/12/2024, 13:49:29 UTC)
Source: CVE Database V5
Vendor/Project: Image Access GmbH
Product: Scan2Net

Description

The application uses several hard-coded credentials to encrypt config files during backup, to decrypt the new firmware during an update and some passwords allow a direct connection to the database server of the affected device.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:58:38 UTC

Technical Analysis

CVE-2024-28146 identifies a critical security flaw in the Scan2Net product by Image Access GmbH, where hard-coded credentials are embedded within the application code. These credentials serve multiple sensitive functions: encrypting configuration files during backup processes, decrypting new firmware during updates, and enabling direct connections to the device's database server. The use of hard-coded credentials (CWE-798) is a well-known security anti-pattern because it allows attackers who discover these credentials to bypass authentication controls, escalate privileges, and potentially execute arbitrary code or manipulate device operations. The vulnerability has a CVSS v3.1 base score of 8.4, reflecting high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), meaning the attacker needs local access to the device or network segment, but no privileges (PR:N) or user interaction (UI:N) are required, which lowers the barrier for exploitation once access is gained. The vulnerability affects all versions listed as '0', indicating possibly all current versions or an unspecified version baseline. The lack of available patches at the time of publication increases the urgency for organizations to implement compensating controls. Although no known exploits have been reported in the wild, the presence of hard-coded credentials in cryptographic and database access functions presents a significant risk of unauthorized data exposure, firmware tampering, and denial of service through malicious updates or configuration changes.

Potential Impact

For European organizations, the exploitation of CVE-2024-28146 could lead to severe consequences including unauthorized access to sensitive configuration data, exposure of confidential information stored or processed by Scan2Net devices, and the ability for attackers to deploy malicious firmware updates that compromise device integrity or availability. This could disrupt business operations, especially in sectors relying on Scan2Net for document scanning and management, such as government agencies, financial institutions, and healthcare providers. The direct database access enabled by hard-coded passwords could allow attackers to extract or manipulate critical data, potentially violating data protection regulations like GDPR. Furthermore, compromised devices could be used as pivot points within internal networks, increasing the risk of lateral movement and broader network compromise. The high CVSS score reflects the broad impact on confidentiality, integrity, and availability, making this vulnerability a significant risk for organizations with Scan2Net deployments in Europe.

Mitigation Recommendations

Immediate mitigation steps include isolating Scan2Net devices from untrusted networks to limit local access opportunities. Organizations should monitor network traffic for unusual database connection attempts and unauthorized firmware update activities. Since no patches are currently available, administrators should enforce strict access controls around devices, including network segmentation and limiting physical access. Implementing application-layer firewalls or intrusion detection systems to detect anomalous behavior related to backup encryption or firmware decryption processes can help. Vendors and users should prioritize the development and deployment of firmware updates that remove hard-coded credentials and replace them with secure credential management solutions such as hardware security modules or secure vaults. Additionally, organizations should conduct thorough audits of device configurations and logs to detect any signs of compromise. Training staff to recognize and respond to suspicious device behavior is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2024-03-05T09:15:40.202Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092623fe7723195e0b471f

Added to database: 11/3/2025, 10:01:07 PM

Last enriched: 11/3/2025, 11:58:38 PM

Last updated: 11/5/2025, 2:08:05 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats