CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-1346

Medium Severity
Laborofficefree
SVRS
30/100

CVSSv3
5.5/10

EPSS
0.00218/1

CVE-2024-1346 allows attackers to calculate the MySQL root password for LaborOfficeFree version 19.10. This vulnerability stems from a weak default root password being easily derived using only two constants. The calculated password allows unauthorized access to the application's database.

CVE-2024-1346's low SVRS score of 30 suggests a lower risk profile than some vulnerabilities, but the presence of active exploits means the risk should not be ignored. Although the CVSS score is moderate, the easy exploitability increases the potential for widespread attacks. Successful exploitation grants full access to the database, potentially exposing sensitive data and allowing for application compromise. Organizations using LaborOfficeFree 19.10 should prioritize patching or mitigation steps.

In The Wild
Exploit Avaliable
CVSS:3.1
AV:L
AC:L
PR:L
UI:N
S:U
C:H
I:N
A:N
2024-02-19

2025-03-24
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-1346 is a vulnerability in LaborOfficeFree version 19.10 that allows an attacker to calculate the root password of the MySQL database used by the software. This vulnerability is rated as medium severity with a CVSS score of 6.8. However, SOCRadar's unique 'SOCRadar Vulnerability Risk Score' (SVRS) assigns it a score of 46, indicating a moderate risk level.

Key Insights:

  1. Active Exploitation: This vulnerability is actively exploited in the wild, meaning hackers are using it to target systems.
  2. Weak Password: The vulnerability stems from a weak default root password for the MySQL database, making it easier for attackers to gain unauthorized access.
  3. Impact: Successful exploitation of this vulnerability could allow attackers to gain control of the MySQL database, potentially leading to data theft, manipulation, or denial of service.

Mitigation Strategies:

  1. Update Software: LaborOfficeFree users should immediately update to the latest version (19.11) to address this vulnerability.
  2. Change Default Password: Change the default root password for the MySQL database to a strong, unique password.
  3. Implement Strong Authentication: Enable two-factor authentication (2FA) for database access to add an extra layer of security.
  4. Monitor and Detect: Implement security monitoring solutions to detect any suspicious activities or unauthorized access attempts.

Additional Information:

  • Threat Actors/APT Groups: There is no information available regarding specific threat actors or APT groups actively exploiting this vulnerability.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
  • Exploit Status: Active exploits for this vulnerability have been published.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

TitleSoftware LinkDate
LaborOfficeFree 19.10 - MySQL Root Password Calculatorhttps://www.laborofficefree.com/#plans2024-03-16
nomi-sec/PoC-in-GitHubhttps://github.com/nomi-sec/PoC-in-GitHub2019-12-08
Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-1346 | LaborOfficeFree 19.10 weak password
vuldb.com2025-03-24
CVE-2024-1346 | LaborOfficeFree 19.10 weak password | A vulnerability was found in LaborOfficeFree 19.10 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to weak password requirements. This vulnerability is handled as CVE-2024-1346. Local access is required to approach this attack. There is no exploit available.
vuldb.com
rss
forum
news

Social Media

No tweets found for this CVE

Affected Software

Configuration 1
TypeVendorProduct
AppLaborofficefreelaborofficefree

References

ReferenceLink
[email protected]https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-laborofficefree
AF854A3A-2127-422B-91AE-364DA2661108https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-laborofficefree
[email protected]https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-laborofficefree

CWE Details

CWE IDCWE NameDescription
CWE-521Weak Password RequirementsThe product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence