Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45744: CWE-257 Storing Passwords in a Recoverable Format in TopQuadrant TopBraid EDG

0
Low
VulnerabilityCVE-2024-45744cvecve-2024-45744cwe-257cwe-312
Published: Fri Sep 27 2024 (09/27/2024, 15:56:11 UTC)
Source: CVE Database V5
Vendor/Project: TopQuadrant
Product: TopBraid EDG

Description

TopQuadrant TopBraid EDG stores external credentials insecurely. An authenticated attacker with file system access can read edg-setup.properites and obtain the secret to decrypt external passwords stored in edg-vault.properties. An authenticated attacker could gain file system access using a separate vulnerability such as CVE-2024-45745. At least version 7.1.3 is affected. Version 7.3 adds HashiCorp Vault integration that does not store external passwords locally. Version 8.3.0 warns when using plain text secrets.

AI-Powered Analysis

AILast updated: 10/04/2025, 10:59:59 UTC

Technical Analysis

CVE-2024-45744 is a security vulnerability affecting TopQuadrant's TopBraid EDG product, specifically version 7.1.3. The vulnerability arises from the insecure storage of external credentials within the application. TopBraid EDG stores encrypted external passwords in the file edg-vault.properties; however, the encryption key or secret required to decrypt these passwords is stored in plaintext in the edg-setup.properties file. An attacker who has authenticated access and can read the file system can retrieve the secret from edg-setup.properties and then decrypt the stored passwords in edg-vault.properties. This vulnerability is classified under CWE-257 (Storing Passwords in a Recoverable Format) and CWE-312 (Cleartext Storage of Sensitive Information). Exploitation requires prior authenticated access and file system read permissions, which may be obtained through other vulnerabilities such as CVE-2024-45745. The vulnerability does not require user interaction and has a CVSS v3.1 base score of 3.0, indicating low severity. The impact is limited to confidentiality, with no direct effect on integrity or availability. Later versions of TopBraid EDG (7.3 and above) mitigate this risk by integrating with HashiCorp Vault, which avoids local storage of external passwords, and version 8.3.0 introduces warnings when plain text secrets are used. There are no known exploits in the wild at this time.

Potential Impact

For European organizations using TopBraid EDG version 7.1.3, this vulnerability poses a risk to the confidentiality of external credentials stored by the application. If an attacker gains authenticated access and file system read permissions—potentially through chaining with other vulnerabilities—they could decrypt and misuse these credentials. This could lead to unauthorized access to connected external systems or services, potentially exposing sensitive data or enabling further lateral movement within the network. While the direct impact is limited to credential disclosure, the compromised credentials could facilitate more severe attacks depending on the privileges associated with those credentials. Given that TopBraid EDG is used for enterprise data governance and metadata management, exposure of credentials could undermine data security and compliance efforts. The low CVSS score reflects the requirement for prior authenticated access and file system permissions, limiting the attack surface. However, organizations with weak internal access controls or insufficient segmentation may face higher risks.

Mitigation Recommendations

European organizations should upgrade TopBraid EDG to version 7.3 or later, which integrates HashiCorp Vault for secure external password management, eliminating local storage of sensitive credentials. If immediate upgrade is not feasible, organizations should restrict file system access to only trusted administrators and monitor for unauthorized access attempts. Implement strict access controls and auditing on servers running TopBraid EDG to detect suspicious activity. Additionally, organizations should review and patch any related vulnerabilities such as CVE-2024-45745 that could provide attackers with file system access. Employ network segmentation to limit exposure of critical systems and credentials. Consider rotating external credentials stored in TopBraid EDG after applying mitigations. Finally, enable logging and alerting on access to sensitive configuration files to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2024-09-05T23:12:56.519Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3c0b66c7f7acdd3d073

Added to database: 10/4/2025, 10:15:28 AM

Last enriched: 10/4/2025, 10:59:59 AM

Last updated: 10/4/2025, 1:05:24 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats