Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41517: n/a

0
Medium
VulnerabilityCVE-2024-41517cvecve-2024-41517
Published: Fri Aug 02 2024 (08/02/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-41517 is an Incorrect Access Control vulnerability in Feripro versions up to 2. 2. 3, specifically in the "/admin/benutzer/institution/rechteverwaltung/uebersicht" endpoint. This flaw allows remote attackers to retrieve a list of all users and their associated privileges without authentication or user interaction. The vulnerability has a CVSS score of 5. 3, indicating medium severity, with low impact on confidentiality and no impact on integrity or availability. Exploitation requires no privileges and can be performed remotely over the network. No known exploits are currently reported in the wild. Organizations using Feripro should prioritize patching or implementing access restrictions to prevent unauthorized information disclosure. Countries with significant Feripro usage or targeting of administrative systems in education or institutional sectors are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:07:29 UTC

Technical Analysis

CVE-2024-41517 is an Incorrect Access Control vulnerability identified in the Feripro software, version 2.2.3 and earlier. The vulnerability exists in the administrative interface endpoint "/admin/benutzer/institution/rechteverwaltung/uebersicht", which is responsible for managing user privileges within the system. Due to improper access control checks, remote attackers can access this endpoint without authentication, allowing them to retrieve a comprehensive list of all users and their corresponding privilege levels. This exposure of user privilege data can aid attackers in reconnaissance efforts, potentially facilitating further targeted attacks or privilege escalation attempts. The vulnerability is remotely exploitable over the network without requiring any user interaction or prior privileges, increasing its accessibility to attackers. The CVSS v3.1 base score is 5.3, reflecting a medium severity primarily due to the confidentiality impact, as integrity and availability remain unaffected. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights a critical lapse in access control validation within Feripro's administrative modules, emphasizing the need for strict authentication and authorization enforcement on sensitive endpoints.

Potential Impact

The primary impact of CVE-2024-41517 is the unauthorized disclosure of user and privilege information within affected Feripro installations. This information leakage can facilitate attacker reconnaissance, enabling them to identify high-privilege accounts and tailor subsequent attacks such as social engineering, credential stuffing, or privilege escalation. Although the vulnerability does not directly compromise system integrity or availability, the exposure of sensitive user privilege data undermines organizational security posture and increases the risk of more severe attacks. Organizations relying on Feripro for institutional or administrative management may face increased risk of targeted intrusions, especially if attackers combine this information with other vulnerabilities or weak credential policies. The lack of authentication requirements for exploitation broadens the attack surface, potentially allowing external threat actors to gather sensitive data without detection. While no active exploitation is currently known, the medium severity rating and ease of access make timely remediation important to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2024-41517, organizations should immediately restrict access to the "/admin/benutzer/institution/rechteverwaltung/uebersicht" endpoint by implementing strong authentication and authorization controls, ensuring only authorized administrative users can access this resource. Network-level controls such as IP whitelisting or VPN requirements can further limit exposure. Monitoring and logging access to administrative endpoints should be enhanced to detect any unauthorized attempts. If patches or updates become available from Feripro, they should be applied promptly. In the absence of official patches, consider deploying web application firewalls (WAFs) with custom rules to block unauthorized requests targeting this endpoint. Conduct a thorough review of user privilege assignments and audit logs to detect any suspicious activity. Educate administrative users about the risks of privilege information disclosure and enforce strong credential policies to reduce the risk of subsequent attacks leveraging leaked data.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cbbb7ef31ef0b5687d6

Added to database: 2/25/2026, 9:42:19 PM

Last enriched: 2/26/2026, 7:07:29 AM

Last updated: 2/26/2026, 9:35:26 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats