CVE-2024-45877: n/a
baltic-it TOPqw Webportal v1.35.283.2 is vulnerable to Incorrect Access Control in the User Management function in /Apps/TOPqw/BenutzerManagement.aspx. This allows a low privileged user to access all modules in the web portal, view and manipulate information and permissions of other users, lock other user or unlock the own account, change the password of other users, create new users or delete existing users and view, manipulate and delete reference data.
AI Analysis
Technical Summary
CVE-2024-45877 identifies an Incorrect Access Control vulnerability in the User Management functionality of baltic-it TOPqw Webportal version 1.35.283.2, specifically in the /Apps/TOPqw/BenutzerManagement.aspx page. This vulnerability allows a low privileged authenticated user to bypass intended access restrictions and gain unauthorized access to all modules within the web portal. Exploitation enables the attacker to view and manipulate other users' information and permissions, lock other user accounts, unlock their own account, change passwords of other users, create new user accounts, delete existing users, and modify or delete reference data. The vulnerability arises due to improper enforcement of access control checks (classified under CWE-863), allowing privilege escalation within the application. The CVSS v3.1 base score is 6.5, reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting integrity but not confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability poses a significant risk to organizations relying on this web portal for user and data management, as it can lead to unauthorized administrative control and data manipulation.
Potential Impact
The primary impact of CVE-2024-45877 is unauthorized privilege escalation within the baltic-it TOPqw Webportal, allowing low privileged users to gain administrative capabilities. This can lead to unauthorized access and manipulation of sensitive user data, including changing passwords, locking/unlocking accounts, and modifying user permissions, which compromises the integrity of the system. The ability to create or delete users and alter reference data can disrupt normal operations and potentially facilitate further attacks or insider threats. Although availability is not directly affected, the integrity violations can cause significant operational disruptions and loss of trust in the system. Organizations worldwide using this portal risk insider abuse, data tampering, and unauthorized administrative control, which could lead to compliance violations, data breaches, and operational downtime.
Mitigation Recommendations
To mitigate CVE-2024-45877, organizations should immediately restrict access to the User Management module to only fully trusted administrators until a patch is available. Implement additional access control checks at the application and network layers, such as web application firewalls (WAFs) with custom rules to detect and block unauthorized access attempts to BenutzerManagement.aspx. Conduct thorough audits of user permissions and monitor logs for suspicious activities related to user management functions. Employ multi-factor authentication (MFA) for all administrative accounts to reduce the risk of compromised credentials being exploited. If possible, isolate the web portal in a segmented network zone with strict access controls. Engage with baltic-it for official patches or updates and apply them promptly once released. Additionally, conduct regular security assessments and penetration tests focusing on access control mechanisms to detect similar vulnerabilities proactively.
Affected Countries
Germany, Poland, Czech Republic, Austria, Switzerland, Slovakia, Hungary, Netherlands, Belgium, France
CVE-2024-45877: n/a
Description
baltic-it TOPqw Webportal v1.35.283.2 is vulnerable to Incorrect Access Control in the User Management function in /Apps/TOPqw/BenutzerManagement.aspx. This allows a low privileged user to access all modules in the web portal, view and manipulate information and permissions of other users, lock other user or unlock the own account, change the password of other users, create new users or delete existing users and view, manipulate and delete reference data.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-45877 identifies an Incorrect Access Control vulnerability in the User Management functionality of baltic-it TOPqw Webportal version 1.35.283.2, specifically in the /Apps/TOPqw/BenutzerManagement.aspx page. This vulnerability allows a low privileged authenticated user to bypass intended access restrictions and gain unauthorized access to all modules within the web portal. Exploitation enables the attacker to view and manipulate other users' information and permissions, lock other user accounts, unlock their own account, change passwords of other users, create new user accounts, delete existing users, and modify or delete reference data. The vulnerability arises due to improper enforcement of access control checks (classified under CWE-863), allowing privilege escalation within the application. The CVSS v3.1 base score is 6.5, reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting integrity but not confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability poses a significant risk to organizations relying on this web portal for user and data management, as it can lead to unauthorized administrative control and data manipulation.
Potential Impact
The primary impact of CVE-2024-45877 is unauthorized privilege escalation within the baltic-it TOPqw Webportal, allowing low privileged users to gain administrative capabilities. This can lead to unauthorized access and manipulation of sensitive user data, including changing passwords, locking/unlocking accounts, and modifying user permissions, which compromises the integrity of the system. The ability to create or delete users and alter reference data can disrupt normal operations and potentially facilitate further attacks or insider threats. Although availability is not directly affected, the integrity violations can cause significant operational disruptions and loss of trust in the system. Organizations worldwide using this portal risk insider abuse, data tampering, and unauthorized administrative control, which could lead to compliance violations, data breaches, and operational downtime.
Mitigation Recommendations
To mitigate CVE-2024-45877, organizations should immediately restrict access to the User Management module to only fully trusted administrators until a patch is available. Implement additional access control checks at the application and network layers, such as web application firewalls (WAFs) with custom rules to detect and block unauthorized access attempts to BenutzerManagement.aspx. Conduct thorough audits of user permissions and monitor logs for suspicious activities related to user management functions. Employ multi-factor authentication (MFA) for all administrative accounts to reduce the risk of compromised credentials being exploited. If possible, isolate the web portal in a segmented network zone with strict access controls. Engage with baltic-it for official patches or updates and apply them promptly once released. Additionally, conduct regular security assessments and penetration tests focusing on access control mechanisms to detect similar vulnerabilities proactively.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-09-11T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cf1b7ef31ef0b56a684
Added to database: 2/25/2026, 9:43:13 PM
Last enriched: 2/28/2026, 7:08:22 AM
Last updated: 4/12/2026, 1:58:04 PM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.