Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37773: n/a

0
Medium
VulnerabilityCVE-2024-37773cvecve-2024-37773
Published: Mon Dec 16 2024 (12/16/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-37773 is an HTML injection vulnerability in Sunbird DCIM dcTrack version 9. 1. 2 that allows authenticated administrators to inject arbitrary HTML code into an administrative interface. The vulnerability requires administrator-level privileges and user interaction to exploit, limiting its scope. The CVSS score is 4. 8 (medium severity), reflecting limited confidentiality and integrity impacts without affecting availability. Exploitation could lead to UI manipulation, phishing, or session hijacking within the admin panel. No known public exploits or patches are currently available. Organizations using Sunbird DCIM dcTrack 9. 1.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:22:18 UTC

Technical Analysis

CVE-2024-37773 identifies an HTML injection vulnerability in Sunbird DCIM dcTrack version 9.1.2. This vulnerability allows attackers with authenticated administrator privileges to inject arbitrary HTML code into an administrative screen. The injection occurs because the application does not properly sanitize or encode user-supplied input before rendering it in the admin interface. While the vulnerability requires high privileges (administrator access) and user interaction (admin must be logged in and interact with the affected screen), it can be leveraged to manipulate the admin UI, potentially enabling phishing attacks, session hijacking, or unauthorized actions through malicious scripts embedded in the HTML. The vulnerability is categorized under CWE-94 (Improper Control of Generation of Code), indicating that injected code could be executed in the context of the admin interface. The CVSS v3.1 base score is 4.8, with vector AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N, reflecting network attack vector, low attack complexity, high privileges required, user interaction required, scope changed, and limited confidentiality and integrity impacts without availability impact. No patches or public exploits have been reported as of the publication date (December 16, 2024).

Potential Impact

The primary impact of this vulnerability is on the confidentiality and integrity of the administrative interface of Sunbird DCIM dcTrack 9.1.2. An attacker with administrator credentials could inject malicious HTML to manipulate the UI, potentially tricking administrators into divulging sensitive information or executing unintended actions. This could lead to session hijacking, credential theft, or unauthorized configuration changes within the DCIM environment. Since the vulnerability requires administrator privileges and user interaction, the risk is somewhat mitigated but still significant in environments where admin credentials may be compromised or shared. The vulnerability does not affect system availability directly but could indirectly impact operational integrity if attackers modify critical infrastructure management data. Organizations relying on dcTrack for data center infrastructure management could face operational disruptions, data integrity issues, and increased risk of further compromise if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2024-37773, organizations should: 1) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2) Monitor administrative activities and audit logs for unusual behavior that could indicate exploitation attempts. 3) Implement web application firewalls (WAFs) with custom rules to detect and block suspicious HTML injection payloads targeting the admin interface. 4) Apply the principle of least privilege by limiting the number of administrators and their permissions within dcTrack. 5) Regularly review and sanitize all user inputs in custom integrations or scripts interacting with dcTrack to prevent injection vectors. 6) Stay informed about vendor updates and apply security patches promptly once available. 7) Educate administrators about phishing and social engineering risks that could facilitate exploitation of this vulnerability. 8) Consider network segmentation to isolate the DCIM system from less trusted networks to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c6fb7ef31ef0b563f94

Added to database: 2/25/2026, 9:41:03 PM

Last enriched: 2/26/2026, 5:22:18 AM

Last updated: 2/26/2026, 6:47:44 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats