In h2oai/h2o-3 version 3.46.0, an endpoint exposing a custom EncryptionTool allows an attacker to encrypt any files on the target server with a key of their choosing. The chosen key can also be overwritten, resulting in ransomware-like behavior. This vulnerability makes it possible for an attacker to encrypt arbitrary files with keys of their choice, making it exceedingly difficult for the target to recover the keys needed for decryption.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Jul 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
H2o
H2o h2o |
|
CPEs | cpe:2.3:a:h2o:h2o:3.46.0:*:*:*:*:*:*:* | |
Vendors & Products |
H2o
H2o h2o |
Thu, 20 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In h2oai/h2o-3 version 3.46.0, an endpoint exposing a custom EncryptionTool allows an attacker to encrypt any files on the target server with a key of their choosing. The chosen key can also be overwritten, resulting in ransomware-like behavior. This vulnerability makes it possible for an attacker to encrypt arbitrary files with keys of their choice, making it exceedingly difficult for the target to recover the keys needed for decryption. | |
Title | Encryption of Arbitrary Files with Attacker-Controlled Key in h2oai/h2o-3 | |
Weaknesses | CWE-749 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:10:30.190Z
Updated: 2025-03-20T18:20:48.958Z
Reserved: 2024-07-17T20:44:51.896Z
Link: CVE-2024-6863

Updated: 2025-03-20T17:51:25.263Z

Status : Analyzed
Published: 2025-03-20T10:15:34.493
Modified: 2025-07-15T15:52:34.060
Link: CVE-2024-6863

No data.