CVE-2024-1224

7.1 HIGH

📋 TL;DR

This vulnerability in USB Pratirodh allows local attackers with administrative privileges to obtain passwords due to weak SHA1 hashing. Attackers could then take control of the application to modify user/device access controls. Only systems running USB Pratirodh with administrative access are affected.

💻 Affected Systems

Products:
  • USB Pratirodh
Versions: Specific versions not specified in provided references
Operating Systems: Windows (implied from context)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local administrative privileges to exploit. Exact version ranges not provided in available references.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full control of USB Pratirodh application, modifies all user/device access controls, potentially enabling lateral movement or persistence on the system.

🟠

Likely Case

Privileged insider or compromised admin account exploits the vulnerability to extract passwords and escalate privileges within the USB control application.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential password exposure without successful privilege escalation.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring administrative access to the system.
🏢 Internal Only: HIGH - Internal attackers with administrative privileges can exploit this to compromise the USB security application.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative privileges and knowledge of weak cryptographic implementation. No public exploit code identified in provided references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0080

Restart Required: Yes

Instructions:

1. Check CERT-IN advisory for patch details. 2. Contact USB Pratirodh vendor for updated version. 3. Apply security update. 4. Restart system/application as required.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative privileges to only essential personnel to reduce attack surface.

Monitor Administrative Activity

all

Implement logging and monitoring for administrative actions on USB Pratirodh systems.

🧯 If You Can't Patch

  • Implement strict access controls to limit who has administrative privileges on systems running USB Pratirodh.
  • Monitor for unusual administrative activity or password extraction attempts on affected systems.

🔍 How to Verify

Check if Vulnerable:

Check if USB Pratirodh is installed and uses SHA1 for password hashing in login component. Review application configuration and cryptographic implementation.

Check Version:

Check application properties or vendor documentation for version information.

Verify Fix Applied:

Verify updated version from vendor and confirm SHA1 is no longer used for password hashing in login component.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative access to USB Pratirodh
  • Password extraction attempts
  • Changes to user/device access controls

Network Indicators:

  • Local system authentication anomalies

SIEM Query:

source="USB Pratirodh" AND (event_type="admin_login" OR event_type="password_access" OR event_type="access_control_change")

🔗 References

📤 Share & Export