Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45370: CWE-302: Authentication Bypass by Assumed-Immutable Data in Socomec Easy Config System

0
High
VulnerabilityCVE-2024-45370cvecve-2024-45370cwe-302
Published: Mon Dec 01 2025 (12/01/2025, 15:25:42 UTC)
Source: CVE Database V5
Vendor/Project: Socomec
Product: Easy Config System

Description

An authentication bypass vulnerability exists in the User profile management functionality of Socomec Easy Config System 2.6.1.0. A specially crafted database record can lead to unauthorized access. An attacker can modify a local database to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 12/08/2025, 17:04:25 UTC

Technical Analysis

CVE-2024-45370 is a high-severity authentication bypass vulnerability identified in Socomec Easy Config System version 2.6.1.0, specifically within its user profile management functionality. The root cause is an assumption that certain data in the local database is immutable, which is incorrect. An attacker with low-level privileges can craft or modify a local database record to bypass authentication controls, thereby gaining unauthorized access to the system. This bypass does not require user interaction but does require local access with at least low privileges. The vulnerability impacts the confidentiality and integrity of the system by allowing unauthorized users to escalate privileges or access sensitive configuration data. The CVSS vector (AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N) indicates local attack vector, low attack complexity, low privileges required, no user interaction, scope changed, low confidentiality impact, high integrity impact, and no availability impact. Although no public exploits are currently known, the vulnerability poses a significant risk due to the critical nature of the Socomec Easy Config System, which is used for configuring and managing power and energy equipment. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations.

Potential Impact

For European organizations, particularly those in industrial, energy, and critical infrastructure sectors, this vulnerability could lead to unauthorized access to power management configurations, potentially disrupting operational integrity or enabling further attacks. Compromise of the Easy Config System could allow attackers to alter device configurations, leading to mismanagement of power systems or exposure of sensitive operational data. Given the reliance on Socomec products in European markets for energy management and industrial automation, exploitation could have cascading effects on operational continuity and safety. The confidentiality impact, while rated low, could still expose sensitive configuration data, and the high integrity impact could allow malicious changes that undermine system trustworthiness. The requirement for local access somewhat limits remote exploitation but does not eliminate risk from insider threats or attackers who gain initial footholds through other means.

Mitigation Recommendations

1. Restrict and tightly control local access to systems running Socomec Easy Config System to trusted personnel only. 2. Implement file integrity monitoring on the local database files to detect unauthorized modifications promptly. 3. Employ application whitelisting and endpoint protection to prevent unauthorized modification of the database or execution of untrusted code. 4. Regularly audit user privileges and remove unnecessary local access rights to minimize attack surface. 5. Monitor logs and system behavior for anomalies indicative of authentication bypass attempts. 6. Coordinate with Socomec for timely receipt and application of official patches or updates addressing this vulnerability. 7. Consider network segmentation to isolate systems running Easy Config System from broader enterprise networks to limit lateral movement. 8. Educate staff about the risks of local privilege escalation and enforce strict physical and logical access controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-11-27T15:59:57.067Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692db924f910530b0eb071e2

Added to database: 12/1/2025, 3:49:56 PM

Last enriched: 12/8/2025, 5:04:25 PM

Last updated: 1/18/2026, 9:46:50 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats