CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-27790

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00181/1

CVE-2024-27790 is a vulnerability in FileMaker Server that could allow unauthorized access to database records. The issue has been resolved in FileMaker Server 20.3.2, which now validates transactions before replying to client requests. Despite a CVSS score of 0, indicating minimal impact, SOCRadar's Vulnerability Risk Score (SVRS) assigns it a 30, suggesting a low, but non-negligible, level of risk. While not critical, the potential for unauthorized access means organizations should still apply the patch to prevent potential data breaches. The vulnerability, categorized as CWE-284, improper access control, emphasizes the importance of secure database management practices. While the low SVRS suggests the vulnerability may not be actively exploited, the fact it's tagged as In The Wild indicates potential awareness, and thus risk, that should be addressed. Failing to patch could lead to data exposure, which is a critical risk.

In The Wild
2024-05-14

2024-07-03
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-27790 is a vulnerability with a CVSS score of 0, indicating a low severity level. However, SOCRadar's unique 'SOCRadar Vulnerability Risk Score' (SVRS) assigns it a score of 36, highlighting the potential for significant impact. This discrepancy stems from SVRS's integration of various 'Vulnerability Intelligence' elements, including Social Media, News, Code Repositories, Dark/Deep Web data, and associations with Threat Actors and malware.

Key Insights

  • Active Exploitation: The vulnerability is actively exploited in the wild, posing an immediate threat to organizations.
  • Low CVSS Score: The CVSS score of 0 may underestimate the severity of the vulnerability, as it does not fully capture the potential impact identified by SVRS.
  • Critical for Immediate Action: Despite the low CVSS score, the SVRS score of 36 indicates that organizations should prioritize patching or mitigating this vulnerability immediately.
  • Threat Actors: Specific Threat Actors or APT Groups actively exploiting this vulnerability have not been identified at this time.

Mitigation Strategies

  • Apply Patches: Organizations should prioritize applying patches or updates as soon as they become available from the vendor.
  • Implement Network Segmentation: Segmenting networks can limit the spread of an attack if the vulnerability is exploited.
  • Enable Intrusion Detection Systems (IDS): IDS can detect and alert on suspicious activity, providing early warning of potential attacks.
  • Conduct Regular Security Audits: Regular security audits can identify vulnerabilities and help organizations prioritize remediation efforts.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-27790 | Claris FileMaker Server up to 20.3.1 Client Request improper authorization
vuldb.com2024-12-10
CVE-2024-27790 | Claris FileMaker Server up to 20.3.1 Client Request improper authorization | A vulnerability was found in Claris FileMaker Server up to 20.3.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Client Request Handler. The manipulation leads to improper authorization. This vulnerability is known as CVE-2024-27790. Access to the local network is
vuldb.com
rss
forum
news
Vulnerability Summary for the Week of May 13, 2024
CISA2024-05-20
; The Themify Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's themify_button shortcode in all versions up to, and including, 2.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 2024-05-14 <a href="https://nvd.nist.gov/cvss.cfm?version=2&amp;name=CVE-2024-4567&amp;vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" target="_blank" title
cve-2023-52695
cve-2024-4231
cve-2024-4968
cve-2024-4666

Social Media

CVE-2024-27790: FileMaker Server Vulnerability Patched, Data Access Risk Addressed https://t.co/3zGOkVokOD
0
0
3
#Claris International has announced a crucial patch for #FileMaker Server, addressing a #vulnerability (CVE-2024-27790) that allowed unauthorized access to database records https://t.co/B4yDbkZzwk
0
0
1
🗣 CVE-2024-27790: FileMaker Server Vulnerability Patched, Data Access Risk Addressed https://t.co/mUznge7yjK #security #cybernews #cybersecurity #fridaysecurity #linkedin #twitter #telegram
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://support.claris.com/s/answerview?anum=000041674&amp;language=en_US

CWE Details

CWE IDCWE NameDescription
CWE-284Improper Access ControlThe software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence