CVE-2024-28146: CWE-798 Use of Hard-coded Credentials in Image Access GmbH Scan2Net
The application uses several hard-coded credentials to encrypt config files during backup, to decrypt the new firmware during an update and some passwords allow a direct connection to the database server of the affected device.
AI Analysis
Technical Summary
CVE-2024-28146 identifies a critical security flaw in the Scan2Net product by Image Access GmbH, where hard-coded credentials are embedded within the application code. These credentials serve multiple sensitive functions: encrypting configuration files during backup processes, decrypting new firmware during updates, and enabling direct connections to the device's database server. The use of hard-coded credentials (CWE-798) is a well-known security anti-pattern because it allows attackers who discover these credentials to bypass authentication controls, escalate privileges, and potentially execute arbitrary code or manipulate device operations. The vulnerability has a CVSS v3.1 base score of 8.4, reflecting high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), meaning the attacker needs local access to the device or network segment, but no privileges (PR:N) or user interaction (UI:N) are required, which lowers the barrier for exploitation once access is gained. The vulnerability affects all versions listed as '0', indicating possibly all current versions or an unspecified version baseline. The lack of available patches at the time of publication increases the urgency for organizations to implement compensating controls. Although no known exploits have been reported in the wild, the presence of hard-coded credentials in cryptographic and database access functions presents a significant risk of unauthorized data exposure, firmware tampering, and denial of service through malicious updates or configuration changes.
Potential Impact
For European organizations, the exploitation of CVE-2024-28146 could lead to severe consequences including unauthorized access to sensitive configuration data, exposure of confidential information stored or processed by Scan2Net devices, and the ability for attackers to deploy malicious firmware updates that compromise device integrity or availability. This could disrupt business operations, especially in sectors relying on Scan2Net for document scanning and management, such as government agencies, financial institutions, and healthcare providers. The direct database access enabled by hard-coded passwords could allow attackers to extract or manipulate critical data, potentially violating data protection regulations like GDPR. Furthermore, compromised devices could be used as pivot points within internal networks, increasing the risk of lateral movement and broader network compromise. The high CVSS score reflects the broad impact on confidentiality, integrity, and availability, making this vulnerability a significant risk for organizations with Scan2Net deployments in Europe.
Mitigation Recommendations
Immediate mitigation steps include isolating Scan2Net devices from untrusted networks to limit local access opportunities. Organizations should monitor network traffic for unusual database connection attempts and unauthorized firmware update activities. Since no patches are currently available, administrators should enforce strict access controls around devices, including network segmentation and limiting physical access. Implementing application-layer firewalls or intrusion detection systems to detect anomalous behavior related to backup encryption or firmware decryption processes can help. Vendors and users should prioritize the development and deployment of firmware updates that remove hard-coded credentials and replace them with secure credential management solutions such as hardware security modules or secure vaults. Additionally, organizations should conduct thorough audits of device configurations and logs to detect any signs of compromise. Training staff to recognize and respond to suspicious device behavior is also recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2024-28146: CWE-798 Use of Hard-coded Credentials in Image Access GmbH Scan2Net
Description
The application uses several hard-coded credentials to encrypt config files during backup, to decrypt the new firmware during an update and some passwords allow a direct connection to the database server of the affected device.
AI-Powered Analysis
Technical Analysis
CVE-2024-28146 identifies a critical security flaw in the Scan2Net product by Image Access GmbH, where hard-coded credentials are embedded within the application code. These credentials serve multiple sensitive functions: encrypting configuration files during backup processes, decrypting new firmware during updates, and enabling direct connections to the device's database server. The use of hard-coded credentials (CWE-798) is a well-known security anti-pattern because it allows attackers who discover these credentials to bypass authentication controls, escalate privileges, and potentially execute arbitrary code or manipulate device operations. The vulnerability has a CVSS v3.1 base score of 8.4, reflecting high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), meaning the attacker needs local access to the device or network segment, but no privileges (PR:N) or user interaction (UI:N) are required, which lowers the barrier for exploitation once access is gained. The vulnerability affects all versions listed as '0', indicating possibly all current versions or an unspecified version baseline. The lack of available patches at the time of publication increases the urgency for organizations to implement compensating controls. Although no known exploits have been reported in the wild, the presence of hard-coded credentials in cryptographic and database access functions presents a significant risk of unauthorized data exposure, firmware tampering, and denial of service through malicious updates or configuration changes.
Potential Impact
For European organizations, the exploitation of CVE-2024-28146 could lead to severe consequences including unauthorized access to sensitive configuration data, exposure of confidential information stored or processed by Scan2Net devices, and the ability for attackers to deploy malicious firmware updates that compromise device integrity or availability. This could disrupt business operations, especially in sectors relying on Scan2Net for document scanning and management, such as government agencies, financial institutions, and healthcare providers. The direct database access enabled by hard-coded passwords could allow attackers to extract or manipulate critical data, potentially violating data protection regulations like GDPR. Furthermore, compromised devices could be used as pivot points within internal networks, increasing the risk of lateral movement and broader network compromise. The high CVSS score reflects the broad impact on confidentiality, integrity, and availability, making this vulnerability a significant risk for organizations with Scan2Net deployments in Europe.
Mitigation Recommendations
Immediate mitigation steps include isolating Scan2Net devices from untrusted networks to limit local access opportunities. Organizations should monitor network traffic for unusual database connection attempts and unauthorized firmware update activities. Since no patches are currently available, administrators should enforce strict access controls around devices, including network segmentation and limiting physical access. Implementing application-layer firewalls or intrusion detection systems to detect anomalous behavior related to backup encryption or firmware decryption processes can help. Vendors and users should prioritize the development and deployment of firmware updates that remove hard-coded credentials and replace them with secure credential management solutions such as hardware security modules or secure vaults. Additionally, organizations should conduct thorough audits of device configurations and logs to detect any signs of compromise. Training staff to recognize and respond to suspicious device behavior is also recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2024-03-05T09:15:40.202Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092623fe7723195e0b471f
Added to database: 11/3/2025, 10:01:07 PM
Last enriched: 11/3/2025, 11:58:38 PM
Last updated: 11/5/2025, 2:08:05 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumCVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
UnknownCVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumCVE-2025-12468: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.