CVE-2024-4995: CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') in Asseco Business Solutions S.A. Wapro ERP Desktop
Wapro ERP Desktop is vulnerable to MS SQL protocol downgrade request from a server side, what could lead to an unencrypted communication vulnerable to data interception and modification. This issue affects Wapro ERP Desktop versions before 9.00.0.
AI Analysis
Technical Summary
CVE-2024-4995 is a vulnerability classified under CWE-757 (Selection of Less-Secure Algorithm During Negotiation) and CWE-922 (Incomplete Recovery from Failed Attempts). It affects Wapro ERP Desktop, a widely used enterprise resource planning software developed by Asseco Business Solutions S.A. The vulnerability arises from the product's handling of the Microsoft SQL Server communication protocol. Specifically, the ERP client accepts a protocol downgrade request initiated from the server side, which forces the communication to use a less secure algorithm or even unencrypted transmission. This downgrade bypasses the expected security mechanisms that ensure data confidentiality and integrity during client-server interactions. As a result, an attacker controlling or impersonating the server can intercept sensitive business data, including financial and operational information, and potentially modify it without detection. The vulnerability affects all versions before 9.00.0. The CVSS 4.0 vector indicates the attack is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), but partial attack complexity (AC:L) and partial requirement for attack timing (AT:P). The impact on confidentiality and integrity is high (VC:H, VI:H), with no impact on availability. No patches were listed at the time of publication, and no exploits have been observed in the wild. The vulnerability was reserved in May 2024 and published in December 2024 by CERT-PL.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive ERP data. Wapro ERP Desktop is used by numerous small and medium enterprises across Europe, particularly in Poland and neighboring countries where Asseco has a strong market presence. An attacker exploiting this vulnerability could intercept unencrypted data streams, leading to exposure of financial records, customer data, and internal business processes. Additionally, data modification attacks could corrupt business operations or facilitate fraud. The lack of encryption also increases the risk of man-in-the-middle (MITM) attacks, especially on networks that are not fully secured or rely on VPNs with weak configurations. This could result in regulatory non-compliance under GDPR due to inadequate protection of personal and business data. The critical severity and ease of exploitation without authentication amplify the threat, potentially leading to operational disruptions and reputational damage.
Mitigation Recommendations
Organizations should immediately upgrade Wapro ERP Desktop to version 9.00.0 or later, where this vulnerability is addressed. Until patching is possible, network-level mitigations should be implemented, including enforcing encrypted tunnels such as IPsec or TLS VPNs between clients and servers to prevent interception of downgraded communications. Network segmentation should isolate ERP servers from untrusted networks. Monitoring for unusual SQL Server protocol downgrade attempts or unexpected unencrypted traffic can help detect exploitation attempts. Additionally, organizations should review and harden their MS SQL Server configurations to disallow fallback to insecure protocols or algorithms. Employing intrusion detection systems (IDS) with signatures for protocol downgrade attempts may provide early warning. Finally, conducting security awareness training for IT staff about this vulnerability and its risks will improve incident response readiness.
Affected Countries
Poland, Germany, France, Italy, Spain, Czech Republic, Slovakia, Hungary
CVE-2024-4995: CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') in Asseco Business Solutions S.A. Wapro ERP Desktop
Description
Wapro ERP Desktop is vulnerable to MS SQL protocol downgrade request from a server side, what could lead to an unencrypted communication vulnerable to data interception and modification. This issue affects Wapro ERP Desktop versions before 9.00.0.
AI-Powered Analysis
Technical Analysis
CVE-2024-4995 is a vulnerability classified under CWE-757 (Selection of Less-Secure Algorithm During Negotiation) and CWE-922 (Incomplete Recovery from Failed Attempts). It affects Wapro ERP Desktop, a widely used enterprise resource planning software developed by Asseco Business Solutions S.A. The vulnerability arises from the product's handling of the Microsoft SQL Server communication protocol. Specifically, the ERP client accepts a protocol downgrade request initiated from the server side, which forces the communication to use a less secure algorithm or even unencrypted transmission. This downgrade bypasses the expected security mechanisms that ensure data confidentiality and integrity during client-server interactions. As a result, an attacker controlling or impersonating the server can intercept sensitive business data, including financial and operational information, and potentially modify it without detection. The vulnerability affects all versions before 9.00.0. The CVSS 4.0 vector indicates the attack is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), but partial attack complexity (AC:L) and partial requirement for attack timing (AT:P). The impact on confidentiality and integrity is high (VC:H, VI:H), with no impact on availability. No patches were listed at the time of publication, and no exploits have been observed in the wild. The vulnerability was reserved in May 2024 and published in December 2024 by CERT-PL.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive ERP data. Wapro ERP Desktop is used by numerous small and medium enterprises across Europe, particularly in Poland and neighboring countries where Asseco has a strong market presence. An attacker exploiting this vulnerability could intercept unencrypted data streams, leading to exposure of financial records, customer data, and internal business processes. Additionally, data modification attacks could corrupt business operations or facilitate fraud. The lack of encryption also increases the risk of man-in-the-middle (MITM) attacks, especially on networks that are not fully secured or rely on VPNs with weak configurations. This could result in regulatory non-compliance under GDPR due to inadequate protection of personal and business data. The critical severity and ease of exploitation without authentication amplify the threat, potentially leading to operational disruptions and reputational damage.
Mitigation Recommendations
Organizations should immediately upgrade Wapro ERP Desktop to version 9.00.0 or later, where this vulnerability is addressed. Until patching is possible, network-level mitigations should be implemented, including enforcing encrypted tunnels such as IPsec or TLS VPNs between clients and servers to prevent interception of downgraded communications. Network segmentation should isolate ERP servers from untrusted networks. Monitoring for unusual SQL Server protocol downgrade attempts or unexpected unencrypted traffic can help detect exploitation attempts. Additionally, organizations should review and harden their MS SQL Server configurations to disallow fallback to insecure protocols or algorithms. Employing intrusion detection systems (IDS) with signatures for protocol downgrade attempts may provide early warning. Finally, conducting security awareness training for IT staff about this vulnerability and its risks will improve incident response readiness.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2024-05-16T10:39:00.184Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e0f3bfb66c7f7acdd3cbe7
Added to database: 10/4/2025, 10:15:27 AM
Last enriched: 10/12/2025, 6:46:09 AM
Last updated: 12/4/2025, 6:30:05 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumCVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighCVE-2025-64055: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.