Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-32370: n/a

0
Critical
VulnerabilityCVE-2024-32370cvecve-2024-32370
Published: Tue May 07 2024 (05/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-32370 is a critical remote code vulnerability in HSC Cybersecurity HC Mailinspector versions 5. 2. 17-3 through 5. 2. 18. It allows unauthenticated attackers to send crafted payloads to the id parameter in the mliSystemUsers. php component, resulting in full compromise of confidentiality, integrity, and availability. The vulnerability is classified under CWE-782 and has a CVSS 3. 1 base score of 9. 8, indicating critical severity with no user interaction or privileges required.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:19:02 UTC

Technical Analysis

CVE-2024-32370 is a critical vulnerability affecting HSC Cybersecurity HC Mailinspector versions 5.2.17-3 through 5.2.18. The flaw exists in the mliSystemUsers.php component, specifically in the handling of the id parameter. An attacker can craft a malicious payload targeting this parameter to remotely extract sensitive information without requiring authentication or user interaction. The vulnerability is categorized under CWE-782, which relates to exposure of sensitive information through improper access control or input validation. The CVSS 3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of remote exploitation over the network. Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime candidate for exploitation. The absence of patch links suggests that a fix may not yet be publicly available, increasing the urgency for organizations to implement interim mitigations or monitor for updates from the vendor. This vulnerability could allow attackers to gain unauthorized access to user data, modify system configurations, or disrupt mail inspection services, potentially leading to broader network compromise.

Potential Impact

The impact of CVE-2024-32370 is severe for organizations using affected versions of HC Mailinspector. Successful exploitation can lead to full disclosure of sensitive user information, unauthorized modification of system data, and disruption of mail inspection services. This compromises the confidentiality, integrity, and availability of the affected systems, potentially allowing attackers to pivot within networks, exfiltrate data, or launch further attacks. Organizations relying on HC Mailinspector for email security may face increased risk of phishing, malware delivery, or data breaches. The critical nature of this vulnerability means that even organizations with strong perimeter defenses could be compromised if the vulnerable component is exposed to the internet or accessible internally. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation and widespread impact.

Mitigation Recommendations

1. Immediately isolate affected HC Mailinspector instances from external networks to reduce exposure until a patch is available. 2. Monitor network traffic for unusual requests targeting the mliSystemUsers.php component, especially those manipulating the id parameter. 3. Implement strict input validation and web application firewall (WAF) rules to block suspicious payloads aimed at the vulnerable parameter. 4. Restrict access to the HC Mailinspector management interfaces to trusted IP addresses and require strong authentication mechanisms. 5. Regularly check for vendor advisories and apply official patches or updates as soon as they are released. 6. Conduct thorough audits of system logs and user accounts for signs of compromise or unauthorized access. 7. Employ network segmentation to limit the impact of a potential breach and contain lateral movement. 8. Educate security teams about this vulnerability to ensure rapid detection and response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c37b7ef31ef0b561373

Added to database: 2/25/2026, 9:40:07 PM

Last enriched: 2/26/2026, 4:19:02 AM

Last updated: 2/26/2026, 8:01:05 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats