Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28735: n/a

0
High
VulnerabilityCVE-2024-28735cvecve-2024-28735
Published: Wed Mar 20 2024 (03/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Unit4 Financials by Coda versions prior to 2023Q4 suffer from an incorrect access control authorization bypass vulnerability which allows an authenticated user to modify the password of any user of the application via a crafted request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:42:52 UTC

Technical Analysis

CVE-2024-28735 is an authorization bypass vulnerability affecting Unit4 Financials by Coda versions prior to 2023Q4. The vulnerability arises from improper access control checks that fail to validate whether an authenticated user has the necessary privileges to modify other users' passwords. Exploiting this flaw, an attacker with valid credentials but limited permissions can craft a specially designed request to change the password of any user account within the application, including administrative accounts. This bypass does not require user interaction and can be executed remotely over the network, making it a significant risk. The vulnerability is classified under CWE-287 (Improper Authentication), indicating that the system does not properly verify user authorization before allowing sensitive operations. The CVSS v3.1 base score is 8.1, reflecting high severity due to its network attack vector, low attack complexity, and high impact on confidentiality and integrity. Although no public exploits have been reported yet, the nature of the vulnerability suggests that exploitation could lead to full account takeover and subsequent unauthorized access to sensitive financial data and system functions. The lack of available patches at the time of disclosure means organizations must rely on interim mitigations until updates are released.

Potential Impact

The primary impact of CVE-2024-28735 is unauthorized account takeover, which compromises the confidentiality and integrity of user accounts within Unit4 Financials by Coda. Attackers can escalate privileges by resetting passwords of higher-privileged users, potentially gaining administrative access to financial data and system controls. This can lead to data breaches, fraudulent financial transactions, manipulation of accounting records, and disruption of business operations. Since the vulnerability does not affect availability directly, denial-of-service is less of a concern. However, the ability to impersonate any user poses a severe risk to organizations relying on this software for critical financial management. The impact is especially significant for organizations with many users and complex role hierarchies, as attackers can pivot through accounts to maximize damage. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly given the straightforward nature of the bypass.

Mitigation Recommendations

1. Apply patches or updates from Unit4 as soon as they become available to address the authorization bypass vulnerability. 2. Until patches are released, restrict access to the Unit4 Financials application to trusted users only, using network segmentation and firewall rules to limit exposure. 3. Implement strict monitoring and alerting on password change events, especially those initiated by non-administrative users, to detect suspicious activity early. 4. Enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of credential compromise. 5. Review and tighten user role permissions to minimize the number of users with password modification capabilities. 6. Conduct regular audits of user accounts and password changes to identify unauthorized modifications. 7. Educate users and administrators about this vulnerability and encourage vigilance for unusual account behavior. 8. Consider deploying web application firewalls (WAFs) with custom rules to detect and block crafted requests attempting to exploit this flaw.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d98b7ef31ef0b5891b8

Added to database: 2/25/2026, 9:46:00 PM

Last enriched: 2/26/2026, 5:42:52 PM

Last updated: 4/12/2026, 10:30:03 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses