Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37742: n/a

0
High
VulnerabilityCVE-2024-37742cvecve-2024-37742
Published: Tue Jun 25 2024 (06/25/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Insecure Access Control in Safe Exam Browser (SEB) = 3.5.0 on Windows. The vulnerability allows an attacker to share clipboard data between the SEB kiosk mode and the underlying system, compromising exam integrity. By exploiting this flaw, an attacker can bypass exam controls and gain an unfair advantage during exams.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:45:22 UTC

Technical Analysis

CVE-2024-37742 is an insecure access control vulnerability identified in Safe Exam Browser (SEB) version 3.5.0 running on Windows platforms. SEB is a specialized browser designed to secure online examinations by restricting user capabilities and preventing cheating. The vulnerability arises because SEB's kiosk mode does not properly isolate clipboard data from the underlying operating system. This flaw allows an attacker to share clipboard contents between the SEB environment and the host system. Exploiting this vulnerability enables an attacker to bypass exam controls by either extracting sensitive exam content or injecting unauthorized data into the exam session, thereby undermining exam integrity. The vulnerability is exploitable remotely without requiring any privileges or user interaction, increasing its risk profile. The CVSS 3.1 base score is 8.2, indicating a high severity due to the ease of exploitation (network vector, low attack complexity, no privileges required, no user interaction) and the high confidentiality impact. The vulnerability is classified under CWE-284 (Improper Access Control), highlighting a failure to enforce proper access restrictions. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability is particularly critical for organizations relying on SEB to conduct secure, proctored exams, as it directly threatens the trustworthiness of exam results.

Potential Impact

The primary impact of CVE-2024-37742 is the compromise of confidentiality within secure exam environments. Attackers can access or manipulate clipboard data, potentially leaking exam questions or answers or injecting unauthorized content to cheat. This undermines the integrity of exams, leading to unfair advantages and invalid results. Educational institutions, certification authorities, and any organizations conducting high-stakes online assessments are at risk. The vulnerability does not affect system availability or cause denial of service but severely damages trust in the exam process. Because exploitation requires no privileges or user interaction and can be performed remotely, the scope of affected systems is broad wherever SEB 3.5.0 on Windows is deployed. This could lead to reputational damage, legal challenges, and financial losses for affected organizations. The lack of known exploits in the wild currently limits immediate widespread impact, but the high CVSS score indicates a strong potential for future exploitation if unmitigated.

Mitigation Recommendations

Organizations should immediately assess their use of Safe Exam Browser version 3.5.0 on Windows and restrict or suspend its use until a patch or update is available. In the absence of an official patch, administrators should disable clipboard sharing features at the OS level or through group policies to prevent data leakage between SEB and the host system. Employ endpoint security solutions that can monitor and block unauthorized clipboard access or data exfiltration attempts. Consider deploying additional proctoring controls such as screen recording and behavioral analytics to detect suspicious activity during exams. Educate exam administrators and proctors about this vulnerability and the risks of clipboard sharing. Regularly check for updates from SEB developers and apply security patches promptly once released. For critical exams, consider alternative secure exam solutions with verified isolation mechanisms. Finally, conduct thorough post-exam audits to identify potential breaches or irregularities caused by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c6db7ef31ef0b563ea4

Added to database: 2/25/2026, 9:41:01 PM

Last enriched: 2/28/2026, 3:45:22 AM

Last updated: 4/12/2026, 6:17:05 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses