Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36048: n/a

0
Critical
VulnerabilityCVE-2024-36048cvecve-2024-36048
Published: Sat May 18 2024 (05/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

QAbstractOAuth in Qt Network Authorization in Qt before 5.15.17, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.6, and 6.6.x through 6.7.x before 6.7.1 uses only the time to seed the PRNG, which may result in guessable values.

AI-Powered Analysis

AILast updated: 11/04/2025, 17:57:05 UTC

Technical Analysis

CVE-2024-36048 is a critical security vulnerability found in the QAbstractOAuth class within the Qt Network Authorization module. Qt is a widely used cross-platform application framework, and its OAuth implementation is critical for secure authorization flows in many applications. The vulnerability stems from the use of a pseudorandom number generator (PRNG) seeded solely with the current system time. Since time-based seeds are predictable, an attacker can potentially guess the PRNG output values, which are used to generate OAuth tokens or authorization codes. This predictability undermines the security guarantees of OAuth, allowing attackers to impersonate legitimate users or services, intercept sensitive data, or perform unauthorized actions. The affected Qt versions include all releases before 5.15.17, all 6.x versions before 6.2.13, 6.3.x through 6.5.x before 6.5.6, and 6.6.x through 6.7.x before 6.7.1. The vulnerability does not require any authentication or user interaction, and it can be exploited remotely over the network, increasing the attack surface. The CVSS v3.1 base score of 9.8 indicates critical severity, reflecting high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability's nature suggests that exploitation could lead to full compromise of OAuth-protected resources. The root cause is classified under CWE-335 (Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)). Remediation involves updating to fixed Qt versions where the PRNG seeding is improved to use more secure entropy sources, reducing predictability. Organizations should also review their OAuth implementations for additional security controls and monitor for suspicious authorization activities.

Potential Impact

The impact of CVE-2024-36048 on European organizations can be severe, particularly for those relying on Qt-based applications for secure OAuth authorization. Exploitation could allow attackers to predict OAuth tokens, leading to unauthorized access to sensitive systems and data, compromising confidentiality. Integrity could be undermined by allowing attackers to perform unauthorized actions or modify data. Availability may also be affected if attackers disrupt OAuth flows or cause denial of service through repeated unauthorized attempts. Sectors such as finance, healthcare, telecommunications, and critical infrastructure, which often use OAuth for secure access control, are at heightened risk. The vulnerability's remote exploitability without authentication or user interaction increases the likelihood of attacks. Additionally, organizations developing software with Qt or providing services that depend on Qt OAuth components may face reputational damage and regulatory penalties if breaches occur. The lack of known exploits currently provides a window for proactive mitigation, but the critical severity demands urgent attention.

Mitigation Recommendations

1. Immediately update Qt to the patched versions: 5.15.17 or later, 6.2.13 or later, 6.5.6 or later, and 6.7.1 or later, depending on the version in use. 2. Audit all applications using Qt's QAbstractOAuth for OAuth token generation and ensure they are not relying on vulnerable versions. 3. Implement additional entropy sources for PRNG seeding if custom OAuth implementations exist. 4. Employ multi-factor authentication (MFA) to reduce the impact of compromised tokens. 5. Monitor OAuth authorization logs for unusual or repeated token requests that may indicate exploitation attempts. 6. Conduct penetration testing focused on OAuth flows to detect weaknesses. 7. Educate developers about secure PRNG usage and OAuth best practices. 8. Consider using hardware security modules (HSMs) or secure enclaves for token generation where feasible. 9. Coordinate with Qt maintainers and security teams to stay informed about updates and advisories. 10. For critical systems, implement network segmentation and strict access controls to limit exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-05-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b50ff58c9332ff073ec

Added to database: 11/4/2025, 5:43:44 PM

Last enriched: 11/4/2025, 5:57:05 PM

Last updated: 11/5/2025, 10:50:12 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats