Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42197: CWE-256 Plaintext Storage of a Password in HCL Software Workload Scheduler

0
Medium
VulnerabilityCVE-2024-42197cvecve-2024-42197cwe-256
Published: Thu Dec 11 2025 (12/11/2025, 19:40:11 UTC)
Source: CVE Database V5
Vendor/Project: HCL Software
Product: Workload Scheduler

Description

HCL Workload Scheduler stores user credentials in plain text which can be read by a local user.

AI-Powered Analysis

AILast updated: 12/11/2025, 20:16:26 UTC

Technical Analysis

CVE-2024-42197 identifies a security weakness in HCL Software's Workload Scheduler prior to version 10.2.3, where user credentials are stored in plaintext on the local filesystem. This vulnerability is classified under CWE-256, which pertains to the plaintext storage of sensitive information such as passwords. The vulnerability allows any local user with low privileges (PR:L) to access these stored credentials without requiring any user interaction (UI:N). The attack vector is local (AV:L), meaning the attacker must have some level of access to the system but does not need elevated privileges. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the high impact on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). The scope remains unchanged (S:U), indicating the vulnerability affects only the vulnerable component. No public exploits have been reported yet, but the risk lies in the potential for credential theft, which could facilitate lateral movement or privilege escalation if attackers gain local access. The vulnerability arises from insecure storage practices within the Workload Scheduler, which is used for automating and managing batch workloads and job scheduling in enterprise environments.

Potential Impact

For European organizations, the exposure of plaintext credentials in HCL Workload Scheduler can lead to significant confidentiality breaches. Attackers with local access could extract passwords and use them to access other systems or services, potentially enabling lateral movement within networks. This is particularly critical for industries relying heavily on automation and batch processing, such as finance, manufacturing, and telecommunications, where Workload Scheduler is commonly deployed. The vulnerability does not directly affect system integrity or availability but can indirectly facilitate more severe attacks if credentials are misused. Given the medium CVSS score and the requirement for local access, the threat is moderate but should not be underestimated, especially in environments with multiple users or shared access. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for remediation.

Mitigation Recommendations

Organizations should upgrade HCL Workload Scheduler to version 10.2.3 or later, where this vulnerability is addressed. If immediate patching is not feasible, restrict local access to systems running the Workload Scheduler to trusted administrators only, minimizing the risk of unauthorized credential exposure. Implement strict file system permissions to protect credential storage locations, ensuring that only necessary service accounts and administrators have read access. Consider encrypting sensitive configuration files or credentials externally if supported by the environment. Regularly audit and monitor local user activities and access logs to detect any unauthorized attempts to access credential files. Additionally, employ network segmentation and least privilege principles to limit the impact of compromised credentials. Finally, educate system administrators about the risks of plaintext credential storage and encourage the use of secure credential management solutions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
HCL
Date Reserved
2024-07-29T21:32:08.372Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b21637d4c6f31f7c352f6

Added to database: 12/11/2025, 7:54:11 PM

Last enriched: 12/11/2025, 8:16:26 PM

Last updated: 12/12/2025, 3:57:30 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats