Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34525: n/a

0
Medium
VulnerabilityCVE-2024-34525cvecve-2024-34525
Published: Sun May 05 2024 (05/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

FileCodeBox 2.0 stores a OneDrive password and AWS key in a cleartext env file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:13:05 UTC

Technical Analysis

CVE-2024-34525 identifies a vulnerability in FileCodeBox 2.0 where sensitive credentials—specifically a OneDrive password and an AWS key—are stored in an environment file in cleartext. This practice violates secure credential management principles and corresponds to CWE-591 (Sensitive Data Storage in Improperly Protected Files). The environment file is accessible to any user or process with local file system access, which could include malicious insiders, compromised accounts, or malware operating on the same host. The vulnerability does not require user interaction but does require low-level privileges (local access with limited privileges). Exploiting this vulnerability allows an attacker to obtain credentials that could be used to access cloud services, potentially leading to data exfiltration, unauthorized resource manipulation, or service disruption. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) indicates local attack vector, low complexity, low privileges required, no user interaction, unchanged scope, and low impact on confidentiality, integrity, and availability individually, but combined they present a medium overall risk. No patches or mitigations have been officially released yet, and no known exploits are reported in the wild. This vulnerability highlights the risk of improper credential storage in development or deployment environments, especially for applications interfacing with cloud services like OneDrive and AWS.

Potential Impact

The primary impact of this vulnerability is the exposure of sensitive credentials that can compromise cloud accounts and services. If an attacker gains access to the cleartext OneDrive password and AWS key, they could access, modify, or delete data stored in these cloud environments, leading to data breaches, loss of data integrity, or service outages. This could also facilitate lateral movement within an organization’s network if these credentials are reused or provide access to additional resources. The impact is particularly significant for organizations relying on FileCodeBox 2.0 in multi-user environments or where endpoint security is weak. Although the vulnerability requires local access, the ease of exploitation in shared or compromised systems increases risk. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk of future exploitation. The medium CVSS score reflects a moderate but actionable risk that could escalate if combined with other vulnerabilities or social engineering attacks.

Mitigation Recommendations

Organizations should immediately audit their use of FileCodeBox 2.0 and identify any environment files storing sensitive credentials in cleartext. Restrict file permissions to the minimum necessary, ensuring only trusted system processes and administrators can access these files. Rotate exposed credentials (OneDrive passwords and AWS keys) to invalidate any potentially compromised secrets. Implement secure credential storage solutions such as encrypted vaults, environment variable managers with encryption, or dedicated secrets management tools (e.g., HashiCorp Vault, AWS Secrets Manager). Monitor file system access logs for unauthorized reads of environment files. Educate developers and system administrators on secure credential handling best practices to prevent similar issues. Until an official patch is released, consider isolating FileCodeBox 2.0 usage to trusted environments with strict access controls. Regularly update and patch all related software components and monitor threat intelligence feeds for any emerging exploits related to this CVE.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c53b7ef31ef0b562bc0

Added to database: 2/25/2026, 9:40:35 PM

Last enriched: 2/28/2026, 3:13:05 AM

Last updated: 4/12/2026, 4:21:57 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses