Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37767: n/a

0
High
VulnerabilityCVE-2024-37767cvecve-2024-37767
Published: Fri Jul 05 2024 (07/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-37767 is a high-severity vulnerability in 14Finger v1. 1 where insecure permissions on the /api/admin/user endpoint allow unauthenticated attackers to retrieve all user information via a crafted GET request. This vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The flaw corresponds to CWE-306 (Missing Authentication for Critical Function), leading to a complete confidentiality breach of user data. No known exploits are currently reported in the wild, and no patches have been published yet. Organizations using 14Finger v1. 1 should urgently review access controls on this API endpoint and implement strict authentication and authorization checks. The vulnerability has a CVSS 3. 1 base score of 7. 5, reflecting its high impact on confidentiality without affecting integrity or availability.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:21:36 UTC

Technical Analysis

CVE-2024-37767 is a vulnerability identified in the 14Finger software version 1.1, specifically affecting the /api/admin/user component. The root cause is insecure permissions that allow unauthenticated attackers to send crafted GET requests to this API endpoint and retrieve all user information stored or managed by the system. This vulnerability is classified under CWE-306, which denotes missing authentication for critical functions. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, making it highly accessible to attackers. The CVSS 3.1 score of 7.5 reflects a high severity primarily due to the complete compromise of confidentiality, while integrity and availability remain unaffected. The lack of authentication enforcement on an administrative API endpoint is a critical security oversight, exposing sensitive user data to unauthorized parties. Although no public exploits or patches are currently available, the vulnerability poses a significant risk to organizations using this software. The absence of a patch necessitates immediate compensating controls to prevent exploitation. This vulnerability highlights the importance of enforcing strict access controls and authentication mechanisms on all administrative interfaces, especially APIs that expose sensitive user data.

Potential Impact

The primary impact of CVE-2024-37767 is a total breach of user data confidentiality. Attackers exploiting this vulnerability can access sensitive user information without any authentication, potentially leading to identity theft, privacy violations, and further targeted attacks such as phishing or social engineering. Organizations relying on 14Finger v1.1 risk exposure of their user databases, which can damage reputation, incur regulatory penalties (especially under data protection laws like GDPR or CCPA), and result in financial losses. Since the vulnerability does not affect integrity or availability, the system’s operation remains intact, but the data exposure alone is critical. The ease of exploitation (no authentication or user interaction required) increases the likelihood of attacks, especially from opportunistic threat actors scanning for vulnerable endpoints. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a significant risk until remediated. Organizations in sectors handling sensitive user data such as healthcare, finance, and government are particularly vulnerable to the consequences of this data exposure.

Mitigation Recommendations

1. Immediately restrict network access to the /api/admin/user endpoint using firewalls or network segmentation to limit exposure to trusted internal IP addresses only. 2. Implement strong authentication and authorization controls on the affected API endpoint, ensuring only authorized administrators can access user data. 3. Monitor API logs for unusual or unauthorized GET requests targeting /api/admin/user to detect potential exploitation attempts. 4. If possible, disable or remove the vulnerable API endpoint until a vendor patch or update is available. 5. Engage with the 14Finger vendor or software maintainers to obtain official patches or security updates addressing this vulnerability. 6. Conduct a thorough audit of all administrative APIs in the environment to verify that similar insecure permission issues do not exist elsewhere. 7. Educate development and security teams on secure API design principles, particularly enforcing authentication on all sensitive endpoints. 8. Prepare incident response plans to quickly address any detected exploitation attempts or data breaches related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c6fb7ef31ef0b563f8a

Added to database: 2/25/2026, 9:41:03 PM

Last enriched: 2/26/2026, 5:21:36 AM

Last updated: 2/26/2026, 9:33:16 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats