CVE-2024-37825: n/a
CVE-2024-37825 is a medium-severity directory traversal vulnerability in EnvisionWare Computer Access & Reservation Control SelfCheck v1. 0. It allows unauthenticated attackers on the same network to access restricted directories and potentially sensitive files. The flaw is fixed in OneStop 3. 2. 0. 27184 Hotfix May 2024. Exploitation requires network proximity but no authentication or user interaction. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
CVE-2024-37825 is a directory traversal vulnerability identified in EnvisionWare Computer Access & Reservation Control SelfCheck version 1.0. This vulnerability allows an unauthenticated attacker who is on the same local network as the vulnerable device to perform directory traversal attacks. Directory traversal (CWE-22) enables attackers to access files and directories outside the intended directory structure by manipulating file path inputs. In this case, the flaw could allow attackers to read sensitive files or configuration data that should be inaccessible, potentially exposing confidential information or enabling further attacks. The vulnerability does not require authentication or user interaction, increasing its risk in shared network environments such as libraries or public access networks. The issue has been addressed in the OneStop 3.2.0.27184 Hotfix released in May 2024. The CVSS v3.1 base score is 5.4, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality and integrity but not availability. No public exploits or active exploitation have been reported to date, but the vulnerability's presence in public access systems makes it a concern for organizations relying on EnvisionWare SelfCheck solutions.
Potential Impact
The primary impact of CVE-2024-37825 is unauthorized disclosure of sensitive information due to directory traversal, which compromises confidentiality and potentially integrity if configuration files or scripts are accessed and modified. Since the vulnerability requires network proximity, it mainly threatens environments where attackers can connect to the same local network, such as public libraries, educational institutions, or other public access points using EnvisionWare SelfCheck systems. Exploitation could lead to leakage of user data, system configuration details, or credentials stored in accessible files, increasing the risk of further attacks or data breaches. Although availability is not directly affected, the breach of confidentiality and integrity can undermine trust and operational security. Organizations with multiple deployed units may face a broader attack surface, especially if network segmentation is weak. The lack of authentication requirements makes this vulnerability easier to exploit for insiders or nearby attackers.
Mitigation Recommendations
Organizations should immediately apply the OneStop 3.2.0.27184 Hotfix released in May 2024 to remediate this vulnerability. Until patched, network segmentation should be enforced to isolate EnvisionWare SelfCheck devices from untrusted or public networks, limiting access to trusted personnel only. Implement strict access control lists (ACLs) on network devices to restrict traffic to and from the vulnerable systems. Monitor network traffic for unusual file access patterns or attempts to exploit directory traversal. Conduct regular audits of system logs and file integrity to detect unauthorized access. Disable or restrict unnecessary services on the SelfCheck devices to reduce the attack surface. Educate staff and users about the risks of connecting unauthorized devices to the same network. Finally, maintain an inventory of all EnvisionWare products deployed to ensure timely patch management and vulnerability tracking.
Affected Countries
United States, Canada, United Kingdom, Australia, Germany, France, Netherlands, Sweden, New Zealand
CVE-2024-37825: n/a
Description
CVE-2024-37825 is a medium-severity directory traversal vulnerability in EnvisionWare Computer Access & Reservation Control SelfCheck v1. 0. It allows unauthenticated attackers on the same network to access restricted directories and potentially sensitive files. The flaw is fixed in OneStop 3. 2. 0. 27184 Hotfix May 2024. Exploitation requires network proximity but no authentication or user interaction. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2024-37825 is a directory traversal vulnerability identified in EnvisionWare Computer Access & Reservation Control SelfCheck version 1.0. This vulnerability allows an unauthenticated attacker who is on the same local network as the vulnerable device to perform directory traversal attacks. Directory traversal (CWE-22) enables attackers to access files and directories outside the intended directory structure by manipulating file path inputs. In this case, the flaw could allow attackers to read sensitive files or configuration data that should be inaccessible, potentially exposing confidential information or enabling further attacks. The vulnerability does not require authentication or user interaction, increasing its risk in shared network environments such as libraries or public access networks. The issue has been addressed in the OneStop 3.2.0.27184 Hotfix released in May 2024. The CVSS v3.1 base score is 5.4, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality and integrity but not availability. No public exploits or active exploitation have been reported to date, but the vulnerability's presence in public access systems makes it a concern for organizations relying on EnvisionWare SelfCheck solutions.
Potential Impact
The primary impact of CVE-2024-37825 is unauthorized disclosure of sensitive information due to directory traversal, which compromises confidentiality and potentially integrity if configuration files or scripts are accessed and modified. Since the vulnerability requires network proximity, it mainly threatens environments where attackers can connect to the same local network, such as public libraries, educational institutions, or other public access points using EnvisionWare SelfCheck systems. Exploitation could lead to leakage of user data, system configuration details, or credentials stored in accessible files, increasing the risk of further attacks or data breaches. Although availability is not directly affected, the breach of confidentiality and integrity can undermine trust and operational security. Organizations with multiple deployed units may face a broader attack surface, especially if network segmentation is weak. The lack of authentication requirements makes this vulnerability easier to exploit for insiders or nearby attackers.
Mitigation Recommendations
Organizations should immediately apply the OneStop 3.2.0.27184 Hotfix released in May 2024 to remediate this vulnerability. Until patched, network segmentation should be enforced to isolate EnvisionWare SelfCheck devices from untrusted or public networks, limiting access to trusted personnel only. Implement strict access control lists (ACLs) on network devices to restrict traffic to and from the vulnerable systems. Monitor network traffic for unusual file access patterns or attempts to exploit directory traversal. Conduct regular audits of system logs and file integrity to detect unauthorized access. Disable or restrict unnecessary services on the SelfCheck devices to reduce the attack surface. Educate staff and users about the risks of connecting unauthorized devices to the same network. Finally, maintain an inventory of all EnvisionWare products deployed to ensure timely patch management and vulnerability tracking.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-06-10T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c70b7ef31ef0b5640a7
Added to database: 2/25/2026, 9:41:04 PM
Last enriched: 2/26/2026, 5:24:28 AM
Last updated: 2/26/2026, 8:04:42 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.