In h2oai/h2o-3 version 3.46.0, an endpoint exposing a custom EncryptionTool allows an attacker to encrypt any files on the target server with a key of their choosing. The chosen key can also be overwritten, resulting in ransomware-like behavior. This vulnerability makes it possible for an attacker to encrypt arbitrary files with keys of their choice, making it exceedingly difficult for the target to recover the keys needed for decryption.
History

Tue, 15 Jul 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared H2o
H2o h2o
CPEs cpe:2.3:a:h2o:h2o:3.46.0:*:*:*:*:*:*:*
Vendors & Products H2o
H2o h2o

Thu, 20 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description In h2oai/h2o-3 version 3.46.0, an endpoint exposing a custom EncryptionTool allows an attacker to encrypt any files on the target server with a key of their choosing. The chosen key can also be overwritten, resulting in ransomware-like behavior. This vulnerability makes it possible for an attacker to encrypt arbitrary files with keys of their choice, making it exceedingly difficult for the target to recover the keys needed for decryption.
Title Encryption of Arbitrary Files with Attacker-Controlled Key in h2oai/h2o-3
Weaknesses CWE-749
References
Metrics cvssV3_0

{'score': 6.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2025-03-20T10:10:30.190Z

Updated: 2025-03-20T18:20:48.958Z

Reserved: 2024-07-17T20:44:51.896Z

Link: CVE-2024-6863

cve-icon Vulnrichment

Updated: 2025-03-20T17:51:25.263Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-20T10:15:34.493

Modified: 2025-07-15T15:52:34.060

Link: CVE-2024-6863

cve-icon Redhat

No data.