Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45877: n/a

0
Medium
VulnerabilityCVE-2024-45877cvecve-2024-45877
Published: Wed Nov 13 2024 (11/13/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

baltic-it TOPqw Webportal v1.35.283.2 is vulnerable to Incorrect Access Control in the User Management function in /Apps/TOPqw/BenutzerManagement.aspx. This allows a low privileged user to access all modules in the web portal, view and manipulate information and permissions of other users, lock other user or unlock the own account, change the password of other users, create new users or delete existing users and view, manipulate and delete reference data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:08:22 UTC

Technical Analysis

CVE-2024-45877 identifies an Incorrect Access Control vulnerability in the User Management functionality of baltic-it TOPqw Webportal version 1.35.283.2, specifically in the /Apps/TOPqw/BenutzerManagement.aspx page. This vulnerability allows a low privileged authenticated user to bypass intended access restrictions and gain unauthorized access to all modules within the web portal. Exploitation enables the attacker to view and manipulate other users' information and permissions, lock other user accounts, unlock their own account, change passwords of other users, create new user accounts, delete existing users, and modify or delete reference data. The vulnerability arises due to improper enforcement of access control checks (classified under CWE-863), allowing privilege escalation within the application. The CVSS v3.1 base score is 6.5, reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting integrity but not confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability poses a significant risk to organizations relying on this web portal for user and data management, as it can lead to unauthorized administrative control and data manipulation.

Potential Impact

The primary impact of CVE-2024-45877 is unauthorized privilege escalation within the baltic-it TOPqw Webportal, allowing low privileged users to gain administrative capabilities. This can lead to unauthorized access and manipulation of sensitive user data, including changing passwords, locking/unlocking accounts, and modifying user permissions, which compromises the integrity of the system. The ability to create or delete users and alter reference data can disrupt normal operations and potentially facilitate further attacks or insider threats. Although availability is not directly affected, the integrity violations can cause significant operational disruptions and loss of trust in the system. Organizations worldwide using this portal risk insider abuse, data tampering, and unauthorized administrative control, which could lead to compliance violations, data breaches, and operational downtime.

Mitigation Recommendations

To mitigate CVE-2024-45877, organizations should immediately restrict access to the User Management module to only fully trusted administrators until a patch is available. Implement additional access control checks at the application and network layers, such as web application firewalls (WAFs) with custom rules to detect and block unauthorized access attempts to BenutzerManagement.aspx. Conduct thorough audits of user permissions and monitor logs for suspicious activities related to user management functions. Employ multi-factor authentication (MFA) for all administrative accounts to reduce the risk of compromised credentials being exploited. If possible, isolate the web portal in a segmented network zone with strict access controls. Engage with baltic-it for official patches or updates and apply them promptly once released. Additionally, conduct regular security assessments and penetration tests focusing on access control mechanisms to detect similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cf1b7ef31ef0b56a684

Added to database: 2/25/2026, 9:43:13 PM

Last enriched: 2/28/2026, 7:08:22 AM

Last updated: 4/12/2026, 1:58:04 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses