Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6400: CWE-312 Cleartext Storage of Sensitive Information in Finrota Netahsilat

0
High
VulnerabilityCVE-2024-6400cvecve-2024-6400cwe-312cwe-202
Published: Fri Oct 04 2024 (10/04/2024, 11:12:30 UTC)
Source: CVE Database V5
Vendor/Project: Finrota
Product: Netahsilat

Description

Cleartext Storage of Sensitive Information, Exposure of Sensitive Information Through Data Queries vulnerability in Finrota Netahsilat allows Retrieve Embedded Sensitive Data, Authentication Bypass, IMAP/SMTP Command Injection, Collect Data from Common Resource Locations. This issue solved in versions 1.21.10, 1.23.01, 1.23.08, 1.23.11 and 1.24.03.

AI-Powered Analysis

AILast updated: 10/14/2025, 13:23:00 UTC

Technical Analysis

CVE-2024-6400 is a vulnerability identified in the Finrota Netahsilat product that stems from the cleartext storage of sensitive information (CWE-312) and exposure of sensitive data through data queries (CWE-202). This flaw allows attackers to retrieve embedded sensitive data without proper authorization, bypass authentication mechanisms, and exploit IMAP/SMTP command injection vectors. The vulnerability also enables attackers to collect data from common resource locations, potentially escalating the impact. The CVSS 4.0 score of 8.2 reflects a high severity due to network attack vector, low attack complexity, no privileges required, but requiring user interaction, and high impact on confidentiality and scope. The vulnerability affects versions prior to 1.21.10 and several subsequent patched versions including 1.23.01, 1.23.08, 1.23.11, and 1.24.03. The root cause is improper handling and storage of sensitive data in cleartext, which can be accessed or manipulated by attackers to compromise system integrity and confidentiality. The IMAP/SMTP command injection indicates that the product interacts with mail protocols, which can be abused to execute unauthorized commands or exfiltrate data. Although no known exploits are reported in the wild, the combination of authentication bypass and data exposure presents a significant risk, especially in financial environments where Netahsilat is deployed. The vulnerability requires some user interaction but no privileges, making it easier to exploit remotely. The patching of affected versions is critical to prevent exploitation.

Potential Impact

For European organizations, especially those in the financial sector using Finrota Netahsilat, this vulnerability poses a serious risk to the confidentiality and integrity of sensitive financial data. Attackers could retrieve sensitive embedded data, bypass authentication controls, and manipulate email protocols to exfiltrate data or disrupt communications. This could lead to financial fraud, data breaches, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The ability to bypass authentication and perform command injection increases the attack surface and potential for lateral movement within networks. Given the critical nature of financial data and the regulatory environment in Europe, exploitation could result in significant operational and legal consequences. Organizations relying on this software must act swiftly to mitigate these risks.

Mitigation Recommendations

1. Immediately upgrade Finrota Netahsilat to one of the patched versions: 1.21.10, 1.23.01, 1.23.08, 1.23.11, or 1.24.03. 2. Conduct a thorough audit of all stored sensitive data to ensure it is encrypted at rest using strong cryptographic standards. 3. Review and tighten access controls to limit who can query or retrieve sensitive information within the application. 4. Monitor and analyze IMAP/SMTP traffic for unusual command patterns or injection attempts, employing email security gateways with anomaly detection. 5. Implement multi-factor authentication to reduce the risk of authentication bypass exploitation. 6. Educate users about phishing and social engineering risks that could facilitate user interaction required for exploitation. 7. Regularly review logs and alerts related to authentication and data access events to detect early signs of exploitation attempts. 8. Coordinate with Finrota support for any additional security advisories or patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TR-CERT
Date Reserved
2024-06-28T11:59:51.082Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ee4b3a509368ccaa76d78e

Added to database: 10/14/2025, 1:08:10 PM

Last enriched: 10/14/2025, 1:23:00 PM

Last updated: 10/16/2025, 2:28:51 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats