CVE-2024-22074

9.8 CRITICAL

📋 TL;DR

CVE-2024-22074 is an incorrect access control vulnerability in Dynamsoft Service that allows unauthorized users to bypass authentication mechanisms. This affects all systems running vulnerable versions of Dynamsoft Service across multiple version ranges. Attackers can potentially gain unauthorized access to sensitive functionality or data.

💻 Affected Systems

Products:
  • Dynamsoft Service
Versions: 1.8.1025 through 1.8.2013, 1.7.0330 through 1.7.2531, 1.6.0428 through 1.6.1112, 1.5.0625 through 1.5.3116, 1.4.0618 through 1.4.1230, and 1.0.516 through 1.3.0115
Operating Systems: Windows, Linux, macOS (if Dynamsoft Service is installed)
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version ranges are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, access sensitive data, or disrupt service operations.

🟠

Likely Case

Unauthorized access to restricted functionality, potential data exposure, or privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only affecting isolated components.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can directly exploit this vulnerability without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires some level of network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with low attack complexity and no authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.8.2014, 1.7.4212, 1.6.3212, 1.5.31212, 1.4.3212, or 1.3.3212 depending on your base version

Vendor Advisory: https://www.dynamsoft.com/support/security-bulletin-dwt-2024-22074/

Restart Required: Yes

Instructions:

1. Identify current Dynamsoft Service version. 2. Download appropriate patched version from vendor. 3. Backup configuration and data. 4. Install update following vendor instructions. 5. Restart service. 6. Verify successful update.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Dynamsoft Service to only trusted systems

Use firewall rules to block external access to Dynamsoft Service ports

Access Control Lists

all

Implement strict network ACLs to limit which systems can communicate with Dynamsoft Service

Configure firewall/network device ACLs to permit only required source IPs

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Dynamsoft Service from untrusted networks
  • Deploy additional authentication layers or web application firewall rules to detect/prevent access control bypass attempts

🔍 How to Verify

Check if Vulnerable:

Check Dynamsoft Service version via service management console or by examining installed software list

Check Version:

On Windows: Check Programs and Features or use 'sc query DynamsoftService'. On Linux: Check service status or package manager.

Verify Fix Applied:

Verify version number matches patched versions (1.8.2014, 1.7.4212, 1.6.3212, 1.5.31212, 1.4.3212, or 1.3.3212)

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts
  • Authentication bypass logs
  • Unexpected service access from unauthorized sources

Network Indicators:

  • Unusual traffic patterns to Dynamsoft Service ports
  • Access from unexpected IP addresses

SIEM Query:

source="dynamsoft_service" AND (event_type="auth_failure" OR event_type="access_violation")

🔗 References

📤 Share & Export