CVE-2024-5275

HIGH

FileCatalyst <3.8.10-5.1.6 - Info Disclosure

Title source: llm
STIX 2.1

Description

A hard-coded password in the FileCatalyst TransferAgent can be found which can be used to unlock the keystore from which contents may be read out, for example, the private key for certificates. Exploit of this vulnerability could lead to a machine-in-the-middle (MiTM) attack against users of the agent. This issue affects all versions of FileCatalyst Direct from 3.8.10 Build 138 and earlier and all versions of FileCatalyst Workflow from 5.1.6 Build 130 and earlier.

Scores

CVSS v3 7.8
EPSS 0.0005
EPSS Percentile 14.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-259
Status published
Products (2)
Fortra/FileCatalyst Direct 3.7 - 3.8.10.138
Fortra/FileCatalyst Workflow 4.9.8 - 5.1.6.130
Published Jun 18, 2024
Tracked Since Feb 18, 2026