Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4995: CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') in Asseco Business Solutions S.A. Wapro ERP Desktop

0
Critical
VulnerabilityCVE-2024-4995cvecve-2024-4995cwe-757
Published: Wed Dec 18 2024 (12/18/2024, 11:36:47 UTC)
Source: CVE Database V5
Vendor/Project: Asseco Business Solutions S.A.
Product: Wapro ERP Desktop

Description

Wapro ERP Desktop is vulnerable to MS SQL protocol downgrade request from a server side, what could lead to an unencrypted communication vulnerable to data interception and modification. This issue affects Wapro ERP Desktop versions before 9.00.0.

AI-Powered Analysis

AILast updated: 10/04/2025, 10:46:20 UTC

Technical Analysis

CVE-2024-4995 is a critical vulnerability identified in Asseco Business Solutions S.A.'s Wapro ERP Desktop software, specifically affecting versions prior to 9.00.0. The vulnerability is categorized under CWE-757, which involves the selection of less-secure algorithms during negotiation, commonly referred to as an 'algorithm downgrade' attack. In this case, the vulnerability arises from the MS SQL protocol negotiation process between the Wapro ERP Desktop client and the server. An attacker controlling or influencing the server side can force the client to downgrade the communication protocol to a less secure or unencrypted version. This downgrade results in the transmission of sensitive data in plaintext, exposing it to interception and potential modification by attackers. The vulnerability does not require authentication or user interaction, and the attack vector is network-based, making it exploitable remotely. The CVSS 4.0 score of 9.1 (critical) reflects the high impact on confidentiality and integrity due to the exposure of sensitive ERP data and the possibility of data tampering. The vulnerability does not affect availability directly but compromises the trustworthiness and confidentiality of the ERP communications. No known exploits are currently reported in the wild, but the severity and ease of exploitation make it a significant risk. The vulnerability is particularly concerning because ERP systems like Wapro ERP Desktop often handle critical business data, including financial, operational, and customer information, making them attractive targets for attackers seeking espionage, fraud, or disruption. The lack of encryption due to protocol downgrade can facilitate man-in-the-middle (MITM) attacks, data leakage, and unauthorized data manipulation.

Potential Impact

For European organizations using Wapro ERP Desktop, this vulnerability poses a severe risk to the confidentiality and integrity of sensitive business data. Given that ERP systems are central to business operations, exploitation could lead to unauthorized disclosure of financial records, customer data, and internal communications. This could result in regulatory non-compliance, especially under GDPR, leading to significant fines and reputational damage. The ability to intercept and modify data could also enable fraudulent activities, such as falsifying invoices or altering inventory records. The critical nature of the vulnerability means that attackers could exploit it remotely without authentication, increasing the risk of widespread attacks. Organizations in sectors such as manufacturing, retail, and services that rely on Wapro ERP Desktop for daily operations are particularly vulnerable. Furthermore, the exposure of unencrypted data on the network increases the risk of espionage by competitors or state-sponsored actors. The impact extends beyond direct data loss to potential operational disruptions and loss of stakeholder trust.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading Wapro ERP Desktop to version 9.00.0 or later, where the issue is resolved. Until the patch is applied, organizations should enforce network-level protections such as VPNs or IPsec tunnels to ensure encrypted communication channels between clients and servers, effectively preventing downgrade attacks at the network layer. Additionally, implementing strict network segmentation to isolate ERP servers from untrusted networks can reduce exposure. Monitoring network traffic for unencrypted MS SQL communications can help detect potential exploitation attempts. Organizations should also review and harden their MS SQL server configurations to disable support for legacy or less secure protocols that could be leveraged for downgrades. Employing intrusion detection systems (IDS) with signatures for downgrade attacks and anomalous protocol negotiation can provide early warnings. Finally, conducting regular security audits and employee training on recognizing suspicious network activity will enhance overall security posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2024-05-16T10:39:00.184Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e0f3bfb66c7f7acdd3cbe7

Added to database: 10/4/2025, 10:15:27 AM

Last enriched: 10/4/2025, 10:46:20 AM

Last updated: 10/4/2025, 4:49:37 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats