Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3305: CWE-639 Authorization Bypass Through User-Controlled Key in Utarit Information SoliClub

0
High
VulnerabilityCVE-2024-3305cvecve-2024-3305cwe-639cwe-862
Published: Thu Sep 12 2024 (09/12/2024, 13:03:13 UTC)
Source: CVE Database V5
Vendor/Project: Utarit Information
Product: SoliClub

Description

Authorization Bypass Through User-Controlled Key, Missing Authorization vulnerability in Utarit Information SoliClub allows Retrieve Embedded Sensitive Data. This issue affects SoliClub: before 4.4.0 for iOS, before 5.2.1 for Android.

AI-Powered Analysis

AILast updated: 10/14/2025, 13:11:34 UTC

Technical Analysis

CVE-2024-3305 is a vulnerability in the SoliClub mobile application developed by Utarit Information, affecting iOS versions prior to 4.4.0 and Android versions prior to 5.2.1. The vulnerability stems from improper authorization checks, specifically an authorization bypass through a user-controlled key (CWE-639) combined with missing authorization (CWE-862). This flaw allows an attacker to manipulate keys or tokens that the application uses to control access to embedded sensitive data, effectively bypassing intended access controls. The vulnerability does not require any privileges or user interaction, and can be exploited remotely over the network, making it highly accessible to attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H), with limited impacts on integrity and availability. The scope is limited to the SoliClub app but affects both major mobile platforms. Although no public exploits are currently known, the vulnerability's nature suggests that attackers could retrieve sensitive embedded data such as personal user information, credentials, or proprietary business data, leading to potential data breaches and privacy violations. The lack of patches at the time of reporting increases the urgency for affected users and organizations to apply updates once available or implement compensating controls.

Potential Impact

The primary impact of CVE-2024-3305 is unauthorized disclosure of sensitive embedded data within the SoliClub application, which can lead to significant confidentiality breaches. For European organizations, this could mean exposure of personal data protected under GDPR, resulting in legal and financial penalties. The vulnerability could be exploited to access user credentials, private communications, or proprietary business information, undermining trust and potentially enabling further attacks such as identity theft or corporate espionage. The fact that exploitation requires no authentication or user interaction increases the risk of widespread automated attacks. Organizations relying on SoliClub for internal communications, customer engagement, or data storage face risks of operational disruption and reputational damage. The vulnerability also poses risks to sectors with high mobile app usage, including finance, healthcare, and government services, where sensitive data leakage could have severe consequences. Given the network-based attack vector, attackers could exploit this vulnerability remotely, increasing the threat surface for European entities.

Mitigation Recommendations

To mitigate CVE-2024-3305, European organizations should immediately verify the SoliClub app versions in use and upgrade to iOS version 4.4.0 or later and Android version 5.2.1 or later once patches are released. Until patches are available, organizations should restrict network access to the SoliClub application backend using firewall rules and VPNs to limit exposure. Implement application-layer access controls and monitor application logs for unusual access patterns indicative of exploitation attempts. Employ mobile device management (MDM) solutions to enforce app version compliance and restrict installation of vulnerable versions. Conduct regular security assessments and penetration tests focusing on authorization mechanisms within mobile apps. Educate users about the risks of using outdated app versions and encourage prompt updates. Additionally, consider encrypting sensitive data at rest and in transit within the app to reduce the impact of unauthorized access. Collaborate with the vendor for timely updates and vulnerability disclosure information.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TR-CERT
Date Reserved
2024-04-04T11:53:42.686Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ee47d1509368ccaa6fd05b

Added to database: 10/14/2025, 12:53:37 PM

Last enriched: 10/14/2025, 1:11:34 PM

Last updated: 10/16/2025, 2:39:56 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats