Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33872: n/a

0
Critical
VulnerabilityCVE-2024-33872cvecve-2024-33872
Published: Tue Aug 20 2024 (08/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-33872 is a critical SQL Injection vulnerability affecting Keyfactor Command versions 10. 5. x before 10. 5. 1 and 11. 5. x before 11. 5. 1. This flaw allows unauthenticated remote attackers to execute arbitrary code and escalate privileges by exploiting improper input sanitization in SQL queries.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:38:09 UTC

Technical Analysis

CVE-2024-33872 is a critical vulnerability identified in Keyfactor Command versions 10.5.x prior to 10.5.1 and 11.5.x prior to 11.5.1. The vulnerability stems from improper sanitization of user inputs in SQL queries, leading to SQL Injection (CWE-89). This allows unauthenticated attackers to inject malicious SQL commands remotely over the network (AV:N), without any privileges (PR:N) or user interaction (UI:N). Successful exploitation can lead to arbitrary code execution on the underlying system and escalation of privileges (CWE-269), potentially granting attackers full control over the affected server. The vulnerability impacts confidentiality, integrity, and availability of the system, as attackers can manipulate or exfiltrate sensitive data, disrupt services, or install persistent backdoors. Keyfactor Command is a certificate lifecycle management platform widely used by enterprises to manage digital certificates and cryptographic keys, making it a high-value target. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, emphasizing the ease of exploitation and the severe consequences of a successful attack. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be treated as a high priority. The lack of available patches at the time of disclosure necessitates immediate risk mitigation strategies.

Potential Impact

The impact of CVE-2024-33872 is severe for organizations globally that rely on Keyfactor Command for managing digital certificates and cryptographic keys. Exploitation can lead to full system compromise, allowing attackers to execute arbitrary code and escalate privileges without authentication. This can result in unauthorized access to sensitive certificate data, manipulation or theft of cryptographic keys, disruption of certificate issuance and renewal processes, and potential lateral movement within the network. Such breaches can undermine the trustworthiness of an organization's security infrastructure, leading to data breaches, service outages, and compliance violations. Given the critical role of certificate management in securing communications and identity, this vulnerability poses a significant risk to confidentiality, integrity, and availability of enterprise systems. The potential for widespread impact is heightened in sectors like finance, healthcare, government, and technology, where certificate management is integral to operational security.

Mitigation Recommendations

Organizations should immediately upgrade Keyfactor Command to versions 10.5.1 or 11.5.1 or later once patches are available. Until patches are applied, implement strict input validation and sanitization at the application and database layers to block malicious SQL payloads. Employ Web Application Firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting Keyfactor Command endpoints. Restrict network access to the Keyfactor Command management interfaces to trusted IP addresses and use network segmentation to limit exposure. Monitor logs and network traffic for unusual SQL queries or signs of exploitation attempts. Conduct regular security assessments and penetration testing focused on injection flaws. Maintain an incident response plan to quickly address any detected exploitation. Coordinate with Keyfactor support for guidance and updates. Avoid exposing Keyfactor Command interfaces directly to the internet where possible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c49b7ef31ef0b561f74

Added to database: 2/25/2026, 9:40:25 PM

Last enriched: 2/26/2026, 4:38:09 AM

Last updated: 2/26/2026, 8:01:20 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats