Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37825: n/a

0
Medium
VulnerabilityCVE-2024-37825cvecve-2024-37825
Published: Mon Jun 24 2024 (06/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-37825 is a medium-severity directory traversal vulnerability in EnvisionWare Computer Access & Reservation Control SelfCheck v1. 0. It allows unauthenticated attackers on the same network to access restricted directories and potentially sensitive files. The flaw is fixed in OneStop 3. 2. 0. 27184 Hotfix May 2024. Exploitation requires network proximity but no authentication or user interaction. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:24:28 UTC

Technical Analysis

CVE-2024-37825 is a directory traversal vulnerability identified in EnvisionWare Computer Access & Reservation Control SelfCheck version 1.0. This vulnerability allows an unauthenticated attacker who is on the same local network as the vulnerable device to perform directory traversal attacks. Directory traversal (CWE-22) enables attackers to access files and directories outside the intended directory structure by manipulating file path inputs. In this case, the flaw could allow attackers to read sensitive files or configuration data that should be inaccessible, potentially exposing confidential information or enabling further attacks. The vulnerability does not require authentication or user interaction, increasing its risk in shared network environments such as libraries or public access networks. The issue has been addressed in the OneStop 3.2.0.27184 Hotfix released in May 2024. The CVSS v3.1 base score is 5.4, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality and integrity but not availability. No public exploits or active exploitation have been reported to date, but the vulnerability's presence in public access systems makes it a concern for organizations relying on EnvisionWare SelfCheck solutions.

Potential Impact

The primary impact of CVE-2024-37825 is unauthorized disclosure of sensitive information due to directory traversal, which compromises confidentiality and potentially integrity if configuration files or scripts are accessed and modified. Since the vulnerability requires network proximity, it mainly threatens environments where attackers can connect to the same local network, such as public libraries, educational institutions, or other public access points using EnvisionWare SelfCheck systems. Exploitation could lead to leakage of user data, system configuration details, or credentials stored in accessible files, increasing the risk of further attacks or data breaches. Although availability is not directly affected, the breach of confidentiality and integrity can undermine trust and operational security. Organizations with multiple deployed units may face a broader attack surface, especially if network segmentation is weak. The lack of authentication requirements makes this vulnerability easier to exploit for insiders or nearby attackers.

Mitigation Recommendations

Organizations should immediately apply the OneStop 3.2.0.27184 Hotfix released in May 2024 to remediate this vulnerability. Until patched, network segmentation should be enforced to isolate EnvisionWare SelfCheck devices from untrusted or public networks, limiting access to trusted personnel only. Implement strict access control lists (ACLs) on network devices to restrict traffic to and from the vulnerable systems. Monitor network traffic for unusual file access patterns or attempts to exploit directory traversal. Conduct regular audits of system logs and file integrity to detect unauthorized access. Disable or restrict unnecessary services on the SelfCheck devices to reduce the attack surface. Educate staff and users about the risks of connecting unauthorized devices to the same network. Finally, maintain an inventory of all EnvisionWare products deployed to ensure timely patch management and vulnerability tracking.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c70b7ef31ef0b5640a7

Added to database: 2/25/2026, 9:41:04 PM

Last enriched: 2/26/2026, 5:24:28 AM

Last updated: 2/26/2026, 8:04:42 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats