Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from "WebAPI.cfg.xml" in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 23 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Entrust Instant Financial Issuance
         Entrust Instant Financial Issuance entrust Instant Financial Issuance  | 
|
| Weaknesses | CWE-269 | |
| CPEs | cpe:2.3:a:entrust_instant_financial_issuance:entrust_instant_financial_issuance:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Entrust Instant Financial Issuance
         Entrust Instant Financial Issuance entrust Instant Financial Issuance  | 
|
| Metrics | 
        
        cvssV3_1
         
 
  | 
Mon, 23 Sep 2024 18:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from "WebAPI.cfg.xml" in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host. | |
| References | 
         | 
Status: PUBLISHED
Assigner: mitre
Published: 2024-09-23T00:00:00
Updated: 2024-09-23T19:46:54.760Z
Reserved: 2024-06-24T00:00:00
Link: CVE-2024-39342
Updated: 2024-09-23T19:39:34.558Z
Status : Awaiting Analysis
Published: 2024-09-23T18:15:05.570
Modified: 2024-09-26T13:32:55.343
Link: CVE-2024-39342
No data.