Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48145: n/a

0
Critical
VulnerabilityCVE-2024-48145cvecve-2024-48145
Published: Thu Oct 24 2024 (10/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A prompt injection vulnerability in the chatbox of Netangular Technologies ChatNet AI Version v1.0 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:53:11 UTC

Technical Analysis

CVE-2024-48145 is a prompt injection vulnerability identified in the chatbox component of Netangular Technologies ChatNet AI version 1.0. This vulnerability allows an attacker to inject specially crafted input messages that manipulate the AI assistant's processing logic, resulting in unauthorized access to all prior and subsequent chat data exchanged between the user and the AI. The root cause relates to improper sanitization and validation of user input, classified under CWE-77, which involves improper neutralization of special elements used in commands or queries. The vulnerability is remotely exploitable without requiring any authentication or user interaction beyond sending the malicious prompt, making it highly accessible to attackers. The CVSS v3.1 base score is 9.1, indicating critical severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and high availability impact (A:H). The exploitation can lead to full disclosure of sensitive chat histories, potentially exposing confidential business or personal information. Additionally, the availability impact suggests that the service could be disrupted or degraded as a result of exploitation. Currently, no patches or official mitigations have been released by Netangular Technologies, and no active exploits have been observed in the wild. This vulnerability poses a significant risk to organizations relying on ChatNet AI for sensitive communications.

Potential Impact

The impact of CVE-2024-48145 is severe for organizations worldwide using Netangular Technologies ChatNet AI. Confidentiality is critically compromised as attackers can exfiltrate all historical and future chat data, potentially exposing sensitive business communications, intellectual property, personally identifiable information (PII), and other confidential data. The integrity of the chat data is not directly affected, but the availability impact is high, meaning the AI service could become unavailable or unreliable, disrupting business operations that depend on it. The ease of exploitation—requiring no authentication or user interaction beyond sending a crafted message—makes this vulnerability highly dangerous and likely to be targeted once exploit code becomes available. Organizations in sectors such as finance, healthcare, legal, and government that use ChatNet AI for confidential communications face heightened risks of data breaches and operational disruption. The lack of patches increases the window of exposure, emphasizing the urgency of mitigation. The vulnerability also undermines trust in AI-based communication tools, potentially affecting adoption and compliance with data protection regulations.

Mitigation Recommendations

Given the absence of official patches, organizations should implement immediate compensating controls. First, restrict network access to the ChatNet AI chatbox interface to trusted users and internal networks only, using firewalls and access control lists. Implement input validation and sanitization proxies or web application firewalls (WAFs) that can detect and block suspicious prompt injection patterns targeting the chatbox. Monitor chat logs and network traffic for anomalous or unusually formatted input messages that could indicate exploitation attempts. Limit the retention period of chat histories and encrypt stored chat data to reduce exposure in case of exfiltration. Educate users about the risks of sharing sensitive information over the AI chat interface until the vulnerability is patched. Engage with Netangular Technologies to obtain updates on patch availability and apply them promptly once released. Consider alternative AI communication platforms with stronger security postures if mitigation is not feasible. Finally, conduct regular security assessments and penetration testing focusing on AI input handling to detect similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d0db7ef31ef0b56d7b0

Added to database: 2/25/2026, 9:43:41 PM

Last enriched: 2/26/2026, 8:53:11 AM

Last updated: 4/12/2026, 7:52:56 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses